Secure D2D Communication Underlying Cellular Networks: Artificial Noise Assisted

In this paper, we investigate D2D underlaying cellular networks in which both the D2D links and the cellular downlink links have secrecy requirement. We aim to enhance the secrecy sum rate of D2D pairs(DUs) and cellular users(CUs)by sharing the downlink resources of cellular users and exploiting artificial noise. We achieve the design principle for the downlink signal and artificial noise, which provide guidance on secrecy sum rate maximization. Moreover, a pricing-based pairing and D2D power control algorithm is proposed to pair the DUs and CUs for maximizing system secrecy throughput. Finally, simulation results indicate that the secrecy sum rates of DUs and CUs are improved efficiently by injected artificial noise. The proposed pricing-based scheme obtains better performance of system secrecy throughput than random or graph-based algorithms.

[1]  Xiaofeng Tao,et al.  Artificial Noise Assisted Communication in the Multiuser Downlink: Optimal Power Allocation , 2015, IEEE Communications Letters.

[2]  Athina P. Petropulu,et al.  On Ergodic Secrecy Rate for Gaussian MISO Wiretap Channels , 2011, IEEE Transactions on Wireless Communications.

[3]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[4]  Geoffrey Ye Li,et al.  Decentralized interference coordination for D2D communication underlying cellular Networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[5]  Huiming Wang,et al.  Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.

[6]  Suili Feng,et al.  Interference pricing for device-to-device communications , 2014, 2014 IEEE International Conference on Communications (ICC).

[7]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[8]  Matthew R. McKay,et al.  On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.

[9]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[10]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[11]  Rodney A. Kennedy,et al.  Cooperative jamming for secrecy in decentralized wireless networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[12]  Zhu Han,et al.  Radio resource allocation for physical-layer security in D2D underlay communications , 2014, 2014 IEEE International Conference on Communications (ICC).

[13]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[14]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[15]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[16]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[17]  Jeffrey G. Andrews,et al.  Distributed Resource Allocation in Device-to-Device Enhanced Cellular Networks , 2014, IEEE Transactions on Communications.

[18]  Xinbing Wang,et al.  Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.

[19]  Chuan Ma,et al.  Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.