Weighted Sum Secrecy Rate Maximization for D2D Underlaid Cellular Networks

This paper investigates the secrecy rate performance of a device-to-device (D2D) underlaid cellular network with an eavesdropper. Both the base station (BS) and the eavesdropper are assumed to have multiple antennas and apply minimum mean-square error (MMSE) receivers for detection. Different from the literature, mainly focused on enhancing the security of cellular communication using D2D jammers while neglected the secrecy performance of D2D communication, this paper aims to maximize the instantaneous weighted sum secrecy rate (IWSSR) of both cellular and D2D users. The maximization of IWSSR with respect to the transmit power of mobile users is a non-convex problem with non-differentiable objective function. In order to obtain efficient feasible solutions, we transform the IWSSR maximization problem to a min-max problem, relax the non-negative operator in secrecy rate expressions and then propose an alternative algorithm to solve the remaining problem. Simulation results show that the IWSSR of the network can be effectively increased by the proposed algorithm and, compared with exhaustive search (ES), the proposed algorithm performs very close to ES and involves much less computational complexity.

[1]  P. Viswanath,et al.  Fundamentals of Wireless Communication: The wireless channel , 2005 .

[2]  Ming Chen,et al.  Improving Wireless Physical Layer Security via D2D Communication , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[3]  Taewon Hwang,et al.  Energy Efficient Communication for Secure D2D Underlaid Cellular Networks , 2017, IEEE Transactions on Vehicular Technology.

[4]  Mazen O. Hasna,et al.  A Collaboration Incentive Exploiting the Primary-Secondary Systems’ Cross Interference for PHY Security Enhancement , 2016, IEEE Journal of Selected Topics in Signal Processing.

[5]  Hui-Ming Wang,et al.  Optimal Power Allocation for Artificial Noise Under Imperfect CSI Against Spatially Random Eavesdroppers , 2016, IEEE Transactions on Vehicular Technology.

[6]  John M. Cioffi,et al.  Weighted sum-rate maximization using weighted MMSE for MIMO-BC beamforming design , 2008, IEEE Trans. Wirel. Commun..

[7]  Kwok Hung Li,et al.  Enhanced Physical Layer Security in D2D Spectrum Sharing Networks , 2017, IEEE Wireless Communications Letters.

[8]  Ender Tekin,et al.  Correction to: "the Gaussian multiple access wire-tap channel" and "the general Gaussian multiple access and two-way wire-tap channels: achievable rates and cooperative jamming" , 2010, IEEE Trans. Inf. Theory.

[9]  Wei Xu,et al.  Device-to-device communications: The physical layer security advantage , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[10]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[11]  Robert Schober,et al.  Secure Transmission With Large Numbers of Antennas and Finite Alphabet Inputs , 2017, IEEE Transactions on Communications.

[12]  Xinbing Wang,et al.  Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.

[13]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[14]  Ender Tekin,et al.  The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.

[15]  Pingzhi Fan,et al.  Asymptotic Studies for the Impact of Antenna Selection on Secure Two-Way Relaying Communications with Artificial Noise , 2014, IEEE Transactions on Wireless Communications.

[16]  Zhi-Quan Luo,et al.  Dynamic Spectrum Management: Complexity and Duality , 2008, IEEE Journal of Selected Topics in Signal Processing.

[17]  Xiaodong Wang,et al.  Robust Linear Precoder Design for Multi-Cell Downlink Transmission , 2010, IEEE Transactions on Signal Processing.

[18]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[19]  Xiang Cheng,et al.  Cooperation via Spectrum Sharing for Physical Layer Security in Device-to-Device Communications Underlaying Cellular Networks , 2016, 2015 IEEE Global Communications Conference (GLOBECOM).

[20]  Ming Chen,et al.  Energy-Efficient Resource Allocation in D2D Underlaid Cellular Uplinks , 2017, IEEE Communications Letters.

[21]  Ming Chen,et al.  Channel Allocation and Power Control in D2D Uplink Underlaid Cellular Networks , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).

[22]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[23]  Xiang Cheng,et al.  Joint power and access control for physical layer security in D2D communications underlaying cellular networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[24]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[25]  Yongming Huang,et al.  Coordinated Multicell Multiuser Precoding for Maximizing Weighted Sum Energy Efficiency , 2014, IEEE Transactions on Signal Processing.

[26]  David Tse,et al.  Opportunistic beamforming using dumb antennas , 2002, IEEE Trans. Inf. Theory.

[27]  Geoffrey Ye Li,et al.  Device-to-Device Communications Underlaying Cellular Networks , 2013, IEEE Transactions on Communications.

[28]  Zhu Han,et al.  Radio resource allocation for physical-layer security in D2D underlay communications , 2014, 2014 IEEE International Conference on Communications (ICC).

[29]  Ali Ghrayeb,et al.  Secrecy Performance of Multi-User MISO VLC Broadcast Channels With Confidential Messages , 2018, IEEE Transactions on Wireless Communications.

[30]  Hao Xu,et al.  Resource Allocation for Energy-Efficient Transmission in D2D Underlaid Cellular Networks , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).

[31]  Yun-Chol Jong,et al.  An Efficient Global Optimization Algorithm for Nonlinear Sum-of-Ratios Problem ∗ † , 2012 .

[32]  Nei Kato,et al.  Device-to-Device Communication in LTE-Advanced Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[33]  Chuan Ma,et al.  Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.

[34]  Mazen O. Hasna,et al.  Proactive Spectrum Sharing Incentive for Physical Layer Security Enhancement Using Outdated CSI , 2016, IEEE Transactions on Wireless Communications.

[35]  Wei Xu,et al.  Robust Transmission Design for Multicell D2D Underlaid Cellular Networks , 2018, IEEE Transactions on Vehicular Technology.

[36]  Xiaohu You,et al.  Robust Beamforming With Partial Channel State Information for Energy Efficient Networks , 2015, IEEE Journal on Selected Areas in Communications.

[37]  Guanding Yu,et al.  Energy-Efficient Resource Allocation in Single-Cell OFDMA Systems: Multi-Objective Approach , 2015, IEEE Transactions on Wireless Communications.