On the Achievable Transmission Capacity of Secrecy-Based D2D Cellular Networks

Device-to-Device (D2D) communication is one of the key technologies to get to very high data rates in future 5G networks through offloading part of the cellular traffic onto D2D networks. While extensive research is targeted on addressing the many challenges D2D brings along in cellular networks, security issues have not gained much attention, especially that the direct connections between proximity devices are more vulnerable to security threats, which in turn deteriorate users' experience. In this paper, we consider a D2D communication overheard by eavesdroppers in an underlay cellular network, where D2D users access a proportion of the spectrum occupied by cellular users. To mitigate the potential security threats, we turn towards a lightweight low-complexity approach by exploiting the physical characteristics of the wireless channels. Using tools from stochastic geometry, we derive the D2D transmission region and the average transmit power that guarantee a minimum secrecy rate and a target outage probability. Results reveal that when offloading less cellular traffic onto D2D links, the large cellular interference can be exploited to protect D2D links from eavesdroppers. On the other hand, with aggressive D2D offloading, D2D users can achieve a much higher secrecy capacity due to significantly reducing the distances between them.

[1]  Mauro Conti,et al.  Secure Message Delivery Games for Device-to-Device Communications , 2014, GameSec.

[2]  Tobias J. Oechtering,et al.  Privacy-Aware Distributed Bayesian Detection , 2015, IEEE Journal of Selected Topics in Signal Processing.

[3]  Ekram Hossain,et al.  Cognitive and Energy Harvesting-Based D2D Communication in Cellular Networks: Stochastic Geometry Modeling and Analysis , 2014, IEEE Transactions on Communications.

[4]  Jeffrey G. Andrews,et al.  Spectrum Sharing for Device-to-Device Communication in Cellular Networks , 2013, IEEE Transactions on Wireless Communications.

[5]  Zheng Yan,et al.  Security in D2D Communications: A Review , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[6]  Samee Ullah Khan,et al.  Secure Wireless Multicast for Delay-Sensitive Data via Network Coding , 2013, IEEE Transactions on Wireless Communications.

[7]  Hao Chen,et al.  Optimal resource allocation for sensing-based spectrum sharing D2D networks , 2015, Comput. Electr. Eng..

[8]  Geoffrey Ye Li,et al.  Device-to-device communications in cellular networks , 2016, IEEE Communications Magazine.

[9]  Hao Chen,et al.  Resource allocation for sensing-based device-to-device (D2D) networks , 2015, 2015 49th Asilomar Conference on Signals, Systems and Computers.

[10]  Mohamed-Slim Alouini,et al.  Analytical Modeling of Mode Selection and Power Control for Underlay D2D Communication in Cellular Networks , 2014, IEEE Transactions on Communications.

[11]  Hao Chen,et al.  Spatial Spectrum Sensing-Based Device-to-Device Cellular Networks , 2016, IEEE Transactions on Wireless Communications.

[12]  Jeffrey G. Andrews,et al.  On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.

[13]  Aiqing Zhang,et al.  SeDS: Secure Data Sharing Strategy for D2D Communication in LTE-Advanced Networks , 2016, IEEE Transactions on Vehicular Technology.

[14]  Jeffrey G. Andrews,et al.  Power Control for D2D Underlaid Cellular Networks: Modeling, Algorithms, and Analysis , 2013, IEEE Journal on Selected Areas in Communications.

[15]  Raed A. Abd-Alhameed,et al.  Secure device-to-device communication in LTE-A , 2014, IEEE Communications Magazine.

[16]  Trung Quang Duong,et al.  Secure D2D communication in large-scale cognitive cellular networks with wireless power transfer , 2015, 2015 IEEE International Conference on Communications (ICC).

[17]  Xinbing Wang,et al.  Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.

[18]  Li Sun,et al.  Dynamic RACH Partition for Massive Access of Differentiated M2M Services , 2016, Sensors.

[19]  Gary Steri,et al.  Connectivity and security in a D2D communication protocol for public safety applications , 2014, 2014 11th International Symposium on Wireless Communications Systems (ISWCS).

[20]  Xiangyun Zhou,et al.  Physical Layer Security in Cellular Networks: A Stochastic Geometry Approach , 2013, IEEE Transactions on Wireless Communications.

[21]  Stefan Parkvall,et al.  Device-to-Device Communications for National Security and Public Safety , 2014, IEEE Access.

[22]  Jeffrey G. Andrews,et al.  Analytical Modeling of Uplink Cellular Networks , 2012, IEEE Transactions on Wireless Communications.

[23]  Martin Haenggi,et al.  Stochastic Geometry for Modeling, Analysis, and Design of Multi-Tier and Cognitive Cellular Wireless Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[24]  Nei Kato,et al.  Relay-by-smartphone: realizing multihop device-to-device communications , 2014, IEEE Communications Magazine.

[25]  Jeffrey G. Andrews,et al.  A Comprehensive Framework for Device-to-Device Communications in Cellular Networks , 2013, ArXiv.

[26]  Wei Xu,et al.  Device-to-device communications: The physical layer security advantage , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).