Opportunistic access control for enhancing security in D2D-enabled cellular networks

In this paper, we investigate secure communication over cellular uplinks in device-to-device (D2D)-enabled cellular networks. We consider a more general scenario, in which multiple D2D pairs could simultaneously share the same resource block with a specific cellular user. First, an opportunistic access control scheme based on wireless channel gains is proposed, by which the candidate selected set of D2D pairs sharing the same resource block is determined. The proposed scheme could guarantee reliable communications for both cellular users and D2D pairs, and further could combat eavesdroppers while keeping the legitimate cellular user as non-intrusive as possible, regarding D2D pairs as friendly jammers in a non-collaborative way. Then, we derive theoretical results to characterize the security and reliability of the typical cellular and D2D links, respectively. To further support the performance of this hybrid network, we next present an interference threshold optimization model. Our aim is to minimize the connection outage probability (COP) of D2D pairs subject to the secrecy requirement of the cellular user. Finally, simulation results are presented to validate the effectiveness of our proposed scheme.

[1]  Wenyu Luo,et al.  Robust secure transmission for multiuser MISO systems with probabilistic QoS constraints , 2016, Science China Information Sciences.

[2]  Huiming Wang,et al.  Uncoordinated Jammer Selection for Securing SIMOME Wiretap Channels: A Stochastic Geometry Approach , 2015, IEEE Transactions on Wireless Communications.

[3]  Mugen Peng,et al.  Secrecy-Oriented Resource Sharing for Cellular Device-to-Device Underlay , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[4]  Li Sun,et al.  Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation , 2016, IEEE Transactions on Vehicular Technology.

[5]  Wei Xu,et al.  Device-to-device communications: The physical layer security advantage , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[6]  Xiang Cheng,et al.  Cooperation via Spectrum Sharing for Physical Layer Security in Device-to-Device Communications Underlaying Cellular Networks , 2014, IEEE Transactions on Wireless Communications.

[7]  Huiming Wang,et al.  Opportunistic Jamming for Enhancing Security: Stochastic Geometry Modeling and Analysis , 2016, IEEE Transactions on Vehicular Technology.

[8]  Geoffrey Ye Li,et al.  Joint Mode Selection and Resource Allocation for Device-to-Device Communications , 2014, IEEE Transactions on Communications.

[9]  Xiangyun Zhou,et al.  Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers , 2016, IEEE Transactions on Information Forensics and Security.

[10]  Xu Liu,et al.  Moving window scheme for extracting secret keys in stationary environments , 2016, IET Commun..

[11]  Xinbing Wang,et al.  Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.

[12]  Qing Wang,et al.  A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.

[13]  Raed A. Abd-Alhameed,et al.  Secure device-to-device communication in LTE-A , 2014, IEEE Communications Magazine.

[14]  Xiang Cheng,et al.  Cooperation via Spectrum Sharing for Physical Layer Security in Device-to-Device Communications Underlaying Cellular Networks , 2016, 2015 IEEE Global Communications Conference (GLOBECOM).

[15]  Dong In Kim,et al.  Resource allocation for device-to-device communications underlaying LTE-advanced networks , 2013, IEEE Wireless Communications.

[16]  Yan Zhang,et al.  Secure Transmission for Heterogeneous Cellular Networks With Wireless Information and Power Transfer , 2018, IEEE Systems Journal.

[17]  Xiaoying Gan,et al.  Secrecy-based channel assignment for device-to-device communication: An auction approach , 2013, 2013 International Conference on Wireless Communications and Signal Processing.

[18]  M. Haenggi,et al.  Interference in Large Wireless Networks , 2009, Found. Trends Netw..

[19]  Kang Xiao-le Secure D2D underlaying cellular communication based on artificial noise assisted , 2015 .

[20]  Qihui Wu,et al.  Cellular-Base-Station-Assisted Device-to-Device Communications in TV White Space , 2015, IEEE Journal on Selected Areas in Communications.

[21]  Xiangyun Zhou,et al.  Physical Layer Security in Cellular Networks: A Stochastic Geometry Approach , 2013, IEEE Transactions on Wireless Communications.

[22]  Jing Yang,et al.  A physical-layer authentication scheme based on hash method , 2015, 2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC).

[23]  Navrati Saxena,et al.  Next Generation 5G Wireless Networks: A Comprehensive Survey , 2016, IEEE Communications Surveys & Tutorials.

[24]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[25]  Bin Li,et al.  Robust Artificial Noise-Aided Secure Beamforming in Wireless-Powered Non-Regenerative Relay Networks , 2016, IEEE Access.

[26]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[27]  Kaizhi Huang,et al.  Secure D2D Communication Underlying Cellular Networks: Artificial Noise Assisted , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).

[28]  Bin Li,et al.  Robust beamforming and cooperative jamming for secure transmission in DF relay systems , 2016, EURASIP J. Wirel. Commun. Netw..

[29]  Zhiguo Ding,et al.  Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with device-to-device communications , 2015, IET Commun..

[30]  Mei Song,et al.  Secrecy-Oriented Resource Sharing for Cellular Device-to-Device Underlay , 2014, GLOBECOM 2014.

[31]  Martin Haenggi,et al.  On distances in uniformly random networks , 2005, IEEE Transactions on Information Theory.

[32]  Dongtang Ma,et al.  Destination-Aided Cooperative Jamming for Dual-Hop Amplify-and-Forward MIMO Untrusted Relay Systems , 2016, IEEE Transactions on Vehicular Technology.

[33]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[34]  D. Stoyan,et al.  Stochastic Geometry and Its Applications , 1989 .

[35]  D. Stoyan,et al.  Stochastic Geometry and Its Applications , 1989 .

[36]  Zhu Han,et al.  Radio resource allocation for physical-layer security in D2D underlay communications , 2014, 2014 IEEE International Conference on Communications (ICC).