Joint Subcarrier and Power Allocation in D2D Communications Underlaying Cellular Networks

For the high density of users and accompanying network service requirements in the cellular system, Device-to-Device (D2D) communication is a promising technology to cope with the increasing wireless traffic demands by reusing spectrum resources. In practice, the wireless signal is easy to be eavesdropped in D2D communications underlaying cellular networks, hence, ensuring a secure communication for cellular user equipments (CUEs) is an urgent and meaningful problem. In this paper, we propose a joint subcarrier and power allocation scheme for maximizing the sum data rate of D2D pairs, meanwhile protecting the CUEs against eavesdropping. Specifically, in the proposed scheme, we first quantify the security performance with the secrecy data rate, and obtain the closed-form expression for the optimal power allocation of CUEs and D2D pairs by tightening the quality of service (QoS) and secrecy rate requirement constraints of CUEs. Based on the obtained power allocation solution, by searching the optimal mapping relationship between CUEs and D2D pairs, we develop a subcarrier assignment strategy with the Hungarian algorithm to solve it, which can further enhance the sum data rate of D2D pairs. Simulation results demonstrate that the proposed scheme can significantly yield better performance than other schemes.

[1]  Xiang Cheng,et al.  Cooperation via Spectrum Sharing for Physical Layer Security in Device-to-Device Communications Underlaying Cellular Networks , 2014, IEEE Transactions on Wireless Communications.

[2]  Chuan Ma,et al.  Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.

[3]  Xinlei Chen,et al.  Socially Aware Secrecy-Ensured Resource Allocation in D2D Underlay Communication: An Overlapping Coalitional Game Scheme , 2018, IEEE Transactions on Wireless Communications.

[4]  Xu Chen,et al.  Exploiting Massive D2D Collaboration for Energy-Efficient Mobile Edge Computing , 2017, IEEE Wireless Communications.

[5]  Bin Xia,et al.  Device-to-device communication underlaying cellular networks with the leakage rate constraint , 2014, 2014 IEEE/CIC International Conference on Communications in China (ICCC).

[6]  Kisong Lee,et al.  Power Control for Energy Efficient D2D Communication in Heterogeneous Networks With Eavesdropper , 2017, IEEE Communications Letters.

[7]  Bin Xia,et al.  Secure communications of cellular users in device-to-device communication underlaying cellular networks , 2014, 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP).

[8]  Mingkai Chen,et al.  Optimization-Based Access Assignment Scheme for Physical-Layer Security in D2D Communications Underlaying a Cellular Network , 2018, IEEE Transactions on Vehicular Technology.

[9]  Tao Jiang,et al.  QoS-Aware Admission Control and Resource Allocation in Underlay Device-to-Device Spectrum-Sharing Networks , 2016, IEEE Journal on Selected Areas in Communications.

[10]  Xiang Cheng,et al.  Graph Coloring Based Resource Sharing (GCRS) Scheme for D2D Communications Underlaying Full-Duplex Cellular Networks , 2017, IEEE Transactions on Vehicular Technology.

[11]  Tao Jiang,et al.  Joint Subcarrier Assignment With Power Allocation for Sum Rate Maximization of D2D Communications in Wireless Cellular Networks , 2019, IEEE Transactions on Vehicular Technology.

[12]  Zdenek Becvar,et al.  Resource Allocation for D2D Communication With Multiple D2D Pairs Reusing Multiple Channels , 2019, IEEE Wireless Communications Letters.

[13]  Zhu Han,et al.  Radio resource allocation for physical-layer security in D2D underlay communications , 2014, 2014 IEEE International Conference on Communications (ICC).

[14]  Tao Jiang,et al.  Energy-Efficient Device-to-Device Communications for Green Smart Cities , 2018, IEEE Transactions on Industrial Informatics.

[15]  Hsiao-Hwa Chen,et al.  Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[16]  Xiaohong Jiang,et al.  Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective , 2018, IEEE Transactions on Communications.

[17]  Jiaheng Wang,et al.  Resource Management for Device-to-Device Communication: A Physical Layer Security Perspective , 2018, IEEE Journal on Selected Areas in Communications.

[18]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[19]  Jiaheng Wang,et al.  Security Enhancement via Device-to-Device Communication in Cellular Networks , 2016, IEEE Signal Processing Letters.