Security Enhancement via Device-to-Device Communication in Cellular Networks

Device-to-device (D2D) communication underlaying cellular networks improves spectral efficiency but causes interference to cellular users (CUs). Such interference can be utilized to help CUs prevent wiretapping. This paper aims to achieve the twofold goal of security provisioning for CUs and spectral efficiency enhancement for D2D links by optimizing the resource sharing of CUs and D2D links. We first provide the necessary and sufficient conditions for the accessibility of a CU channel by a D2D link. Then, we derive the jointly optimal resource sharing strategy, including the closed-form power control and the optimal channel pairing of CUs and D2D links. Numerical results show that the proposed strategy can improve both the CUs' security and D2D spectral efficiency.

[1]  Geoffrey Ye Li,et al.  Device-to-Device Communications Underlaying Cellular Networks , 2013, IEEE Transactions on Communications.

[2]  Xiang Cheng,et al.  Joint power and access control for physical layer security in D2D communications underlaying cellular networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[3]  Wei Xu,et al.  Device-to-device communications: The physical layer security advantage , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[4]  Xinbing Wang,et al.  Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.

[5]  Jiaheng Wang,et al.  Resource Sharing of Underlaying Device-to-Device and Uplink Cellular Communications , 2013, IEEE Communications Letters.

[6]  Zhi Ding,et al.  Linear Precoding for Finite-Alphabet Signaling Over MIMOME Wiretap Channels , 2012, IEEE Transactions on Vehicular Technology.

[7]  Zhu Han,et al.  Radio resource allocation for physical-layer security in D2D underlay communications , 2014, 2014 IEEE International Conference on Communications (ICC).

[8]  Chuan Ma,et al.  Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.

[9]  Guidelines for evaluation of radio interface technologies for IMT-Advanced , 2008 .

[10]  Stefan Parkvall,et al.  Design aspects of network assisted device-to-device communications , 2012, IEEE Communications Magazine.