Energy-Efficient Link Adaptation for Secure D2D Underlaid Cellular Networks

We study energy-efficient secure link adaptation for large-scale device-to-device (D2D) underlaid cellular networks, where base stations (BSs), D2D transmitters, and eavesdroppers (Eve nodes) are distributed as independent homogeneous Poisson point processes. First, we analyze the impact of the underlaid D2D network on the secrecy performance, i.e., secrecy spectral efficiency (SE) and secrecy energy efficiency (EE) of the existing cellular network. We show that when the ratio of the Eve node density to the BS density is above a certain threshold, the secrecy performance of the cellular network first increases and then decreases with the D2D power. Otherwise, it decreases with the D2D power. Next, based on the results, we develop a linkadaptation scheme that controls the D2D power, the confidential message rate, and the redundancy rate to strike a balance between the D2D network's secrecy EE and secrecy SE while guaranteeing a required secrecy performance of the existing cellular network. Simulation results show that the proposed link adaptation scheme can achieve all the points on the Pareto boundary.

[1]  Jeffrey G. Andrews,et al.  Power Control for D2D Underlaid Cellular Networks: Modeling, Algorithms, and Analysis , 2013, IEEE Journal on Selected Areas in Communications.

[2]  Olav Tirkkonen,et al.  Resource Sharing Optimization for Device-to-Device Communication Underlaying Cellular Networks , 2011, IEEE Transactions on Wireless Communications.

[3]  Stefan Parkvall,et al.  Design aspects of network assisted device-to-device communications , 2012, IEEE Communications Magazine.

[4]  Guowang Miao,et al.  Energy Efficient Pilot and Link Adaptation for Mobile Users in TDD Multi-User MIMO Systems , 2014, IEEE Transactions on Wireless Communications.

[5]  Jeffrey G. Andrews,et al.  Downlink MIMO HetNets: Modeling, Ordering Results and Performance Analysis , 2013, IEEE Transactions on Wireless Communications.

[6]  Geoffrey Ye Li,et al.  Pricing-Based Interference Coordination for D2D Communications in Cellular Networks , 2015, IEEE Transactions on Wireless Communications.

[7]  Vincent K. N. Lau,et al.  Spectrum sharing between cellular and mobile ad hoc networks: transmission-capacity trade-off , 2008, IEEE Journal on Selected Areas in Communications.

[8]  Derrick Wing Kwan Ng,et al.  Energy-Efficient Resource Allocation for Secure OFDMA Systems , 2012, IEEE Transactions on Vehicular Technology.

[9]  Jiaheng Wang,et al.  Optimal Power Control for Energy Efficient D2D Communication and Its Distributed Implementation , 2015, IEEE Communications Letters.

[10]  Yongming Huang,et al.  Energy-Efficient Precoder Design for MIMO Wiretap Channels , 2014, IEEE Communications Letters.

[11]  A. Robert Calderbank,et al.  Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.

[12]  Jeffrey G. Andrews,et al.  On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.

[13]  Xudong Wang,et al.  Energy-Efficient Transmit Power Control for Multi-tier MIMO HetNets , 2015, IEEE Journal on Selected Areas in Communications.

[14]  Yu Gong,et al.  Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.

[15]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[16]  Zhu Han,et al.  Achieving High Energy Efficiency and Physical-Layer Security in AF Relaying , 2016, IEEE Transactions on Wireless Communications.

[17]  Tho Le-Ngoc,et al.  Energy-efficient resource allocation for D2D communications in cellular networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[18]  Chuan Ma,et al.  Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.

[19]  Halim Yanikomeroglu,et al.  Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions , 2014, IEEE Communications Magazine.

[20]  Matthew R. McKay,et al.  On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.

[21]  Xinbing Wang,et al.  Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.

[22]  Jeffrey G. Andrews,et al.  Heterogeneous Cellular Networks with Flexible Cell Association: A Comprehensive Downlink SINR Analysis , 2011, IEEE Transactions on Wireless Communications.

[23]  H. Vincent Poor,et al.  On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.

[24]  Danpu Liu,et al.  Spatial Throughput Characterization in Cognitive Radio Networks with Threshold-Based Opportunistic Spectrum Access , 2013, IEEE Journal on Selected Areas in Communications.

[25]  Jeffrey G. Andrews,et al.  A Tractable Approach to Coverage and Rate in Cellular Networks , 2010, IEEE Transactions on Communications.