Secrecy Outage and Diversity Analysis in D2D-Enabled Cellular Networks

The mutual interference induced by the hybrid links can bring the secrecy gain for device-to-device (D2D) communication underlaying cellular networks, where there have been few works on studying its impact on the secrecy performance of the accessed D2D pairs. In this paper, our aim is to mainly analyze the secrecy performance gain of the accessed D2D pair brought by the mutual interference.Firstly,an opportunistic D2D pairs selection scheme based on the wireless channel direction information (CDI) is proposed. The proposed scheme determines a set of candidate D2D pairs with the required interference limitation for the cellular user. Then, the D2D pair with best channel condition is scheduled to share the same channel with cellular users for its own transmission. Further, the analytical expressions of the secrecy outage probability are derived with presence of multiple D2D pairs and multiple eavesdroppers. Finally, the secrecy performance of the proposed scheme is demonstrated by simulations.

[1]  Jian Liu,et al.  QoS-based device-to-device communication schemes in heterogeneous wireless networks , 2015, IET Commun..

[2]  Xiaoying Gan,et al.  Secrecy-based channel assignment for device-to-device communication: An auction approach , 2013, 2013 International Conference on Wireless Communications and Signal Processing.

[3]  Hans-Jürgen Zepernick,et al.  On physical layer security for cognitive radio networks with primary user interference , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[4]  Qihui Wu,et al.  Cellular-Base-Station-Assisted Device-to-Device Communications in TV White Space , 2015, IEEE Journal on Selected Areas in Communications.

[5]  Li Sun,et al.  Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation , 2016, IEEE Transactions on Vehicular Technology.

[6]  Wei Xu,et al.  Device-to-device communications: The physical layer security advantage , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[7]  Yong Liu,et al.  Resource management for interference mitigation in device-to-device communication , 2015, IET Commun..

[8]  Raed A. Abd-Alhameed,et al.  Secure device-to-device communication in LTE-A , 2014, IEEE Communications Magazine.

[9]  Zhiguo Ding,et al.  Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with device-to-device communications , 2015, IET Commun..

[10]  Huiming Wang,et al.  Uncoordinated Jammer Selection for Securing SIMOME Wiretap Channels: A Stochastic Geometry Approach , 2015, IEEE Transactions on Wireless Communications.

[11]  Rodney A. Kennedy,et al.  Cooperative jamming for secrecy in decentralized wireless networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[12]  Xinbing Wang,et al.  Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.

[13]  Xuelong Li,et al.  Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.

[14]  Chuan Ma,et al.  Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.

[15]  Bhaskar D. Rao,et al.  Transmit beamforming in multiple-antenna systems with finite rate feedback: a VQ-based approach , 2006, IEEE Transactions on Information Theory.

[16]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[17]  Zhu Han,et al.  Radio resource allocation for physical-layer security in D2D underlay communications , 2014, 2014 IEEE International Conference on Communications (ICC).

[18]  Olav Tirkkonen,et al.  Device-to-Device Communication Underlaying Cellular Communications Systems , 2009, Int. J. Commun. Netw. Syst. Sci..

[19]  Hongbo Zhu,et al.  Large System Secrecy Rate Analysis for SWIPT MIMO Wiretap Channels , 2016, IEEE Transactions on Information Forensics and Security.