Secure V2V Communications via Relays: Resource Allocation and Performance Analysis

In this letter, we will investigate the joint relay selection and subcarrier allocation problem for decode-and-forward relay assisted secure vehicle-to-vehicle (V2V) communications, where the eavesdroppers could be any illegal receivers or non-intending information destinations. The joint relay selection and subcarrier allocation scheme will be proposed to minimize the secure outage probability of each <inline-formula> <tex-math notation="LaTeX">${V_{\text {Tx}}}$ </tex-math></inline-formula>-<inline-formula> <tex-math notation="LaTeX">${V_{\text {Rx}}}$ </tex-math></inline-formula> pair while guaranteeing fairness. Specifically, the joint relay selection and subcarrier allocation problem in secure V2V communications is formulated into a random bipartite graph (RBG) model. The considered problem is then equivalent to generate the maximum matching on every sample of the RBG, thus it can be solved by R<sup>2</sup>HK algorithm with low complexity. By analyzing the properties of the RBG model-based maximum matching, the closed-form approximation formula of the secure outage probability is then obtained. Simulation results will not only verify the accuracy of theoretical derivations, but also show the performance improvement of the proposed approach.

[1]  Zhigang Cao,et al.  Outage optimal subcarrier allocation for downlink secure OFDMA systems , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).

[2]  H. Vincent Poor,et al.  Secrecy Rate Optimization for Secure Multicast Communications , 2016, IEEE Journal of Selected Topics in Signal Processing.

[3]  Tran Trung Duy,et al.  Relay Selection for Security Enhancement in Cognitive Relay Networks , 2015, IEEE Wireless Communications Letters.

[4]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[5]  Lizhong Zheng,et al.  Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels , 2003, IEEE Trans. Inf. Theory.

[6]  Zhiguo Ding,et al.  Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with device-to-device communications , 2015, IET Commun..

[7]  Richard M. Karp,et al.  A n^5/2 Algorithm for Maximum Matchings in Bipartite Graphs , 1971, SWAT.

[8]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[9]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[10]  Meixia Tao,et al.  Relay Placement for Physical Layer Security: A Secure Connection Perspective , 2012, IEEE Communications Letters.

[11]  Ravi Narasimhan Finite-SNR diversity performance of rate-adaptive MIMO systems , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..