Improving physical layer security in underlay D2D communication via Stackelberg game based power control

Device-to-Device (D2D) communication has advantages of improving the spectral resource efficiency. But unfortunately, it brings about interference and potential secrecy hazard. In this paper, a Stackelberg game based power control algorithm is provided to enhance the physical layer security underlaying D2D communication by utilizing the interference. Then, a mathematical model based on Stackelberg game is set up, in which we regard the secrecy energy efficiency as the utility function. After that, the existence and uniqueness of the Stackelberg Equilibrium is proved. In addition, a power control algorithm is offered, which can iteratively converge to the Stackelberg Equilibrium. Finally the simulation results show that by applying the provided algorithm, both the cellular user and the D2D pair have the secrecy energy efficiency improved.

[1]  Zhu Han,et al.  Physical layer security game: How to date a girl with her boyfriend on the same table , 2009, 2009 International Conference on Game Theory for Networks.

[2]  Jeffrey G. Andrews,et al.  An Overview on 3GPP Device-to-Device Proximity Services , 2013, 1310.0116.

[3]  Mehul Motani,et al.  Price-Based Resource Allocation for Spectrum-Sharing Femtocell Networks: A Stackelberg Game Approach , 2012, IEEE Journal on Selected Areas in Communications.

[4]  Yueming Cai,et al.  Stackelberg Game Based Power Allocation for Physical Layer Security of Device-to-device Communication Underlaying Cellular Networks , 2014 .

[5]  Zhu Han,et al.  Resource allocation using a reverse iterative combinatorial auction for device-to-device underlay cellular networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[6]  Qing Wang,et al.  A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.

[7]  Xin-Ping Guan,et al.  Fairness-guaranteed pricing and power allocation with a friendly jammer against eavesdropping , 2012, 2012 International Conference on Wireless Communications and Signal Processing (WCSP).

[8]  Yang Yang,et al.  Power control and channel access for physical-layer security of D2D underlay communication , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).

[9]  Bin Xia,et al.  Secure communications of cellular users in device-to-device communication underlaying cellular networks , 2014, 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP).

[10]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.