Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective

This paper investigates the fundamental issues of mode selection and spectrum partition in cellular networks with in-band device-to-device (D2D) communication from the physical-layer security (PLS) perspective. We consider a mode selection scheme allowing each D2D pair to probabilistically switch between the underlay and overlay modes, and also a spectrum partition scheme where the system spectrum is orthogonally partitioned between cellular and overlay D2D communications. We first develop a general theoretical framework to model the secrecy outage and secrecy capacity performance of cellular users as well as the outage and capacity performance of D2D pairs. Optimization problems are also solved to identify the optimal mode selection and spectrum partition for secrecy capacity maximization and secrecy outage probability minimization. A case study is then provided to demonstrate the application of our theoretical framework for performance modeling and optimization, and also to illustrate the impacts of mode selection and spectrum partition on the PLS performances of in-band D2D communications.

[1]  Minho Jo,et al.  Device-to-device-based heterogeneous radio access network architecture for mobile cloud computing , 2015, IEEE Wireless Communications.

[2]  Xiaohong Jiang,et al.  On Secure Wireless Communications for IoT Under Eavesdropper Collusion , 2016, IEEE Transactions on Automation Science and Engineering.

[3]  Raef Bassily,et al.  Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.

[4]  Xiang Cheng,et al.  Cooperation via Spectrum Sharing for Physical Layer Security in Device-to-Device Communications Underlaying Cellular Networks , 2014, IEEE Transactions on Wireless Communications.

[5]  Robert W. Heath,et al.  Five disruptive technology directions for 5G , 2013, IEEE Communications Magazine.

[6]  Halim Yanikomeroglu,et al.  Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions , 2014, IEEE Communications Magazine.

[7]  Chuan Ma,et al.  Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.

[8]  Trung Q. Duong,et al.  Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model , 2016, IEEE Transactions on Communications.

[9]  Xuelong Li,et al.  Secrecy-Optimized Resource Allocation for Device-to-Device Communication Underlaying Heterogeneous Networks , 2017, IEEE Transactions on Vehicular Technology.

[10]  Jeffrey G. Andrews,et al.  Resource Optimization in Device-to-Device Cellular Systems Using Time-Frequency Hopping , 2014, IEEE Transactions on Wireless Communications.

[11]  Georges Kaddoum,et al.  On the Uplink Secrecy Capacity Analysis in D2D-Enabled Cellular Network , 2018, IEEE Systems Journal.

[12]  Jeffrey G. Andrews,et al.  An Overview on 3GPP Device-to-Device Proximity Services , 2013, 1310.0116.

[13]  Yu Gong,et al.  Dual Antenna Selection in Secure Cognitive Radio Networks , 2016, IEEE Transactions on Vehicular Technology.

[14]  Cong Xiong,et al.  Mode Switching for Energy-Efficient Device-to-Device Communications in Cellular Networks , 2015, IEEE Transactions on Wireless Communications.

[15]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[16]  Yanchun Zhang,et al.  On Secure Wireless Communications for Service Oriented Computing , 2018, IEEE Transactions on Services Computing.

[17]  Jeffrey G. Andrews,et al.  Spectrum Sharing for Device-to-Device Communication in Cellular Networks , 2013, IEEE Transactions on Wireless Communications.

[18]  Daniel Camps-Mur,et al.  Device-to-device communications with Wi-Fi Direct: overview and experimentation , 2013, IEEE Wireless Communications.

[19]  Stefan Parkvall,et al.  Design aspects of network assisted device-to-device communications , 2012, IEEE Communications Magazine.

[20]  Kwok Hung Li,et al.  Enhanced Physical Layer Security in D2D Spectrum Sharing Networks , 2017, IEEE Wireless Communications Letters.

[21]  Mounir Ghogho,et al.  On the analysis of device-to-device overlaid cellular networks in the uplink under 3GPP propagation model , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[22]  Mazen O. Hasna,et al.  A Stochastic Geometric Analysis of Device-to-Device Communications Operating Over Generalized Fading Channels , 2016, IEEE Transactions on Wireless Communications.

[23]  Olav Tirkkonen,et al.  Resource Sharing Optimization for Device-to-Device Communication Underlaying Cellular Networks , 2011, IEEE Transactions on Wireless Communications.

[24]  Jiaheng Wang,et al.  Security Enhancement via Device-to-Device Communication in Cellular Networks , 2016, IEEE Signal Processing Letters.

[25]  Qing Wang,et al.  A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.

[26]  Xiaoying Gan,et al.  Cooperative Spectrum Sharing in D2D-Enabled Cellular Networks , 2016, IEEE Transactions on Communications.

[27]  Carl Wijting,et al.  Device-to-device communication as an underlay to LTE-advanced networks , 2009, IEEE Communications Magazine.

[28]  Jiaheng Wang,et al.  Resource Management for Device-to-Device Communication: A Physical Layer Security Perspective , 2018, IEEE Journal on Selected Areas in Communications.

[29]  Ali A. Nasir,et al.  Mode Selection, Resource Allocation, and Power Control for D2D-Enabled Two-Tier Cellular Network , 2015, IEEE Transactions on Communications.

[30]  M. Bibinger Notes on the sum and maximum of independent exponentially distributed random variables with different scale parameters , 2013, 1307.3945.

[31]  Xinbing Wang,et al.  Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.

[32]  Mugen Peng,et al.  Secrecy-Oriented Resource Sharing for Cellular Device-to-Device Underlay , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[33]  Mingkai Chen,et al.  Optimization-Based Access Assignment Scheme for Physical-Layer Security in D2D Communications Underlaying a Cellular Network , 2018, IEEE Transactions on Vehicular Technology.

[34]  Min Dong,et al.  Multi-Channel Resource Allocation Toward Ergodic Rate Maximization for Underlay Device-to-Device Communications , 2018, IEEE Transactions on Wireless Communications.

[35]  Zhu Han,et al.  Radio resource allocation for physical-layer security in D2D underlay communications , 2014, 2014 IEEE International Conference on Communications (ICC).

[36]  Ramachandran Ramjee,et al.  Generalized Proportional Fair Scheduling in Third Generation Wireless Data Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[37]  Kun Zhu,et al.  Joint Mode Selection and Spectrum Partitioning for Device-to-Device Communication: A Dynamic Stackelberg Game , 2015, IEEE Transactions on Wireless Communications.

[38]  Li Sun,et al.  Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation , 2016, IEEE Transactions on Vehicular Technology.

[39]  Xi Zhang,et al.  Optimal Power Allocation With Statistical QoS Provisioning for D2D and Cellular Communications Over Underlaying Wireless Networks , 2016, IEEE Journal on Selected Areas in Communications.

[40]  M. Abramowitz,et al.  Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .

[41]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[42]  Xiaohong Jiang,et al.  Eavesdropper-Tolerance Capability in Two-Hop Wireless Networks via Cooperative Jamming , 2015, Ad Hoc Sens. Wirel. Networks.

[43]  Syed Faraz Hasan,et al.  Heuristic Algorithm for Proportional Fair Scheduling in D2D-Cellular Systems , 2016, IEEE Transactions on Wireless Communications.