Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation

This paper studies the cooperative device-to-device (D2D) transmissions in cellular networks, where two D2D users communicate bidirectionally with each other and simultaneously serve as relays to assist the two-way transmissions between two cellular users. For this scenario, both cellular and D2D links share the same spectrum, thus creating mutual interference. In addition to that, a security problem also exists since the cellular users want to keep their messages secret from the D2D users and vice versa. To address these two issues, a security-embedded interference avoidance scheme is proposed in this paper. By exploiting the constellation rotation technique, the proposed scheme can create interference-free links for both D2D and cellular communications, thereby significantly improving the system error performance. Moreover, our scheme also provides an inherent secrecy protection at the physical layer, which makes the information exchange between cellular users and that between D2D users confidential from each other.

[1]  Emanuele Viterbo,et al.  Signal Space Diversity: A Power- and Bandwidth-Efficient Diversity Technique for the Rayleigh Fading Channel , 1998, IEEE Trans. Inf. Theory.

[2]  Marco Chiani,et al.  New exponential bounds and approximations for the computation of error probability in fading channels , 2003, IEEE Trans. Wirel. Commun..

[3]  Mazen O. Hasna,et al.  End-to-end performance of transmission systems with relays over Rayleigh-fading channels , 2003, IEEE Trans. Wirel. Commun..

[4]  Aydin Behnad,et al.  Upper bound for the performance metrics of amplify-and-forward cooperative networks based on harmonic mean approximation , 2011, 2011 18th International Conference on Telecommunications.

[5]  Sungsoo Park,et al.  Capacity Enhancement Using an Interference Limited Area for Device-to-Device Uplink Underlaying Cellular Networks , 2011, IEEE Transactions on Wireless Communications.

[6]  Olav Tirkkonen,et al.  Device-to-Device underlay cellular network based on rate splitting , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[7]  Mustafa Cenk Gursoy Secure Communication in the Low-SNR Regime , 2012, IEEE Transactions on Communications.

[8]  Nicola Laurenti,et al.  Physical Layer Authentication over MIMO Fading Wiretap Channels , 2012, IEEE Transactions on Wireless Communications.

[9]  Xinbing Wang,et al.  Cooperative relaying schemes for device-to-device communication underlaying cellular networks , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[10]  Jorma Lilleberg,et al.  Spectrum Sharing Scheme Between Cellular Users and Ad-hoc Device-to-Device Users , 2013, IEEE Transactions on Wireless Communications.

[11]  An Wang,et al.  Physical layer security for multiuser two-way relay using distributed auction game , 2013, 2013 IEEE Third International Conference on Information Science and Technology (ICIST).

[12]  Andrea J. Goldsmith,et al.  The Multiway Relay Channel , 2013, IEEE Transactions on Information Theory.

[13]  Yiyang Pei,et al.  Resource Allocation for Device-to-Device Communications Overlaying Two-Way Cellular Networks , 2013, IEEE Trans. Wirel. Commun..

[14]  Wan Choi,et al.  Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone , 2014, IEEE Transactions on Information Forensics and Security.

[15]  Wei Xu,et al.  Device-to-device communications: The physical layer security advantage , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[16]  Halim Yanikomeroglu,et al.  Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions , 2014, IEEE Communications Magazine.

[17]  Jun Huang,et al.  Resource allocation for intercell device-to-device communication underlaying cellular network: A game-theoretic approach , 2014, 2014 23rd International Conference on Computer Communication and Networks (ICCCN).

[18]  Zhiguo Ding,et al.  Harvest-and-jam: Improving security for wireless energy harvesting cooperative networks , 2014, 2014 IEEE Global Communications Conference.

[19]  Xinbing Wang,et al.  Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.

[20]  Zhiguo Ding,et al.  Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with device-to-device communications , 2015, IET Commun..

[21]  Xiang Chen,et al.  Joint Optimization of Resource Allocation and Relay Selection for Network Coding Aided Device-to-Device Communications , 2015, IEEE Communications Letters.

[22]  Eduard A. Jorswieck,et al.  Weak Secrecy in the Multiway Untrusted Relay Channel With Compute-and-Forward , 2014, IEEE Transactions on Information Forensics and Security.

[23]  Ying Yin,et al.  A Game-Theoretic Resource Allocation Approach for Intercell Device-to-Device Communications in Cellular Networks , 2016, IEEE Transactions on Emerging Topics in Computing.