A Cooperative Jamming Based Secure Uplink Transmission Scheme for Heterogeneous Networks Supporting D2D Communications

A heterogeneous network supporting D2D communications is a typical framework to cope with data sharing in a cyber physical system. In the network, there exists more interference than traditional cellular networks, which promotes interference cancellation (IC) technologies. Yet, how IC can improve security performance of D2D-enabled networks is still unknown. In addition, how to establish a secure physical transmission link for users in these networks is of great significance. In this paper, with IC or not, we first derive the expressions of the secrecy outage probability in D2D-enabled heterogeneous networks, respectively. Then, according to the transmission constraint and the security constraint, we present two cooperative jamming schemes based on devices in D2D networks for achieving secure uplink of cellular users. In these schemes, we formulate the above secure challenge as an optimization problem with or without fully IC and provide the corresponding optimal solutions to improve the secrecy performance of cellular uplink. Finally, numerical simulation demonstrates that the secure performance of cellular uplink is remarkably enhanced using our cooperative jamming schemes.

[1]  Mohamed-Slim Alouini,et al.  Power Control for D2D Underlay Cellular Networks With Channel Uncertainty , 2017, IEEE Transactions on Wireless Communications.

[2]  Abdelmadjid Bouabdallah,et al.  M2M Security: Challenges and Solutions , 2016, IEEE Communications Surveys & Tutorials.

[3]  Jianzhong Li,et al.  A Study on Application-Aware Scheduling in Wireless Networks , 2017, IEEE Transactions on Mobile Computing.

[4]  Xiang Cheng,et al.  Cooperation via Spectrum Sharing for Physical Layer Security in Device-to-Device Communications Underlaying Cellular Networks , 2016, 2015 IEEE Global Communications Conference (GLOBECOM).

[5]  Jianzhong Li,et al.  Curve Query Processing in Wireless Sensor Networks , 2015, IEEE Transactions on Vehicular Technology.

[6]  Xiang Cheng,et al.  Joint power and access control for physical layer security in D2D communications underlaying cellular networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[7]  Chunqiang Hu,et al.  A Novel Cooperative Jamming Scheme for Wireless Social Networks Without Known CSI , 2017, IEEE Access.

[8]  Chengwen Xing,et al.  Guard Zone Based Interference Management for D2D-Aided Underlaying Cellular Networks , 2017, IEEE Transactions on Vehicular Technology.

[9]  Jianzhong Li,et al.  Drawing dominant dataset from big sensory data in wireless sensor networks , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[10]  Qing Wang,et al.  A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.

[11]  Xiaoying Gan,et al.  Cooperative Spectrum Sharing in D2D-Enabled Cellular Networks , 2016, IEEE Transactions on Communications.

[12]  Zhi-Zhong Chen,et al.  A 3.4713-approximation algorithm for the capacitated multicast tree routing problem , 2009, Theor. Comput. Sci..

[13]  Yu Cheng,et al.  Secrecy-oriented partner selection based on social trust in device-to-device communications , 2015, 2015 IEEE International Conference on Communications (ICC).

[14]  Guohui Lin,et al.  Improved Approximation Algorithms for the Capacitated Multicast Routing Problem , 2005, COCOON.

[15]  Jeffrey G. Andrews,et al.  Power Control for D2D Underlaid Cellular Networks: Modeling, Algorithms, and Analysis , 2013, IEEE Journal on Selected Areas in Communications.

[16]  Xinbing Wang,et al.  On the performance of interference cancelation in D2D-enabled cellular networks , 2016, Wirel. Commun. Mob. Comput..

[17]  Ali A. Nasir,et al.  Mode Selection, Resource Allocation, and Power Control for D2D-Enabled Two-Tier Cellular Network , 2015, IEEE Transactions on Communications.

[18]  K. Cumanan,et al.  Limited Feedback Scheme for Device-to-Device Communications in 5G Cellular Networks with Reliability and Cellular Secrecy Outage Constraints , 2017, IEEE Transactions on Vehicular Technology.

[19]  Holger Jaekel,et al.  Cooperative interference cancellation using device-to-device communications , 2014, IEEE Communications Magazine.

[20]  Jiguo Yu,et al.  Approximate Holistic Aggregation in Wireless Sensor Networks , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.

[21]  Zhipeng Cai,et al.  Approximate aggregation for tracking quantiles and range countings in wireless sensor networks , 2015, Theor. Comput. Sci..

[22]  Chunqiang Hu,et al.  LoDPD: A Location Difference-Based Proximity Detection Protocol for Fog Computing , 2017, IEEE Internet of Things Journal.

[23]  Jörg Ott,et al.  Security and Privacy in Device-to-Device (D2D) Communication: A Review , 2017, IEEE Communications Surveys & Tutorials.

[24]  Jianzhong Li,et al.  Extracting Kernel Dataset from Big Sensory Data in Wireless Sensor Networks , 2017, IEEE Transactions on Knowledge and Data Engineering.

[25]  Michail Matthaiou,et al.  Beamforming and Interference Cancellation for D2D Communication Underlaying Cellular Networks , 2016, IEEE Transactions on Communications.

[26]  Xiuzhen Cheng,et al.  Jamming Strategies for Physical Layer Security , 2018, IEEE Wireless Communications.

[27]  Jeffrey G. Andrews,et al.  Spectrum Sharing for Device-to-Device Communication in Cellular Networks , 2013, IEEE Transactions on Wireless Communications.