Physical Layer Secrecy and Transmission Resiliency of Device-to-Device Communications

In this paper, by taking into account the requirements of information secrecy and transmission resiliency, we present a comprehensive scheme enabling secure device-to-device (D2D) networks, where a single-antenna transmitter communicates with a half-duplex single-antenna receiver in the presence of a passive eavesdropper and an adversary jammer. Motivated by physical layer security techniques, artificial noise injection scheme is proposed to ensure communication secrecy. To improve the resiliency against jamming attack, the D2D nodes utilize the frequency hopping technique. Under this system model, we examine the achievable ergodic secrecy rate (ESR) by deriving a new closed-form expression. Furthermore, the optimal power allocation between the artificial noise and data signal is studied for maximizing the ESR. Numerical examples and discussions are provided to depict the efficiency of our proposed scheme compared with the state-of-the-arts.

[1]  Derrick Wing Kwan Ng,et al.  A New Frequency Hopping-Aided Secure Communication in the Presence of an Adversary Jammer and an Untrusted Relay , 2020, 2020 IEEE International Conference on Communications Workshops (ICC Workshops).

[2]  Abbas Mohammadi,et al.  Characterization of untrusted relaying networks in the presence of an adversary jammer , 2019, Wireless Networks.

[3]  Tongtong Li,et al.  Wireless Communications under Hostile Jamming: Security and Efficiency , 2018, Springer Singapore.

[4]  Pedro Figueiredo Silva,et al.  Wireless Positioning in IoT: A Look at Current and Future Trends , 2018, Sensors.

[5]  Jeffrey A. Neasham,et al.  Spread-Spectrum Techniques for Bio-Friendly Underwater Acoustic Communications , 2018, IEEE Access.

[6]  Hien Quoc Ngo,et al.  Full-Duplex Cyber-Weapon With Massive Arrays , 2017, IEEE Transactions on Communications.

[7]  Hsiao-Hwa Chen,et al.  A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.

[8]  Matthew C. Valenti,et al.  Analysis of a Frequency-Hopping Millimeter-Wave Cellular Uplink , 2016, IEEE Transactions on Wireless Communications.

[9]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[10]  Derrick Wing Kwan Ng,et al.  Multi-Objective Optimization for Robust Power Efficient and Secure Full-Duplex Wireless Communication Systems , 2015, IEEE Transactions on Wireless Communications.

[11]  Hamid Behroozi,et al.  Three-Hop Untrusted Relay Networks With Hardware Imperfections and Channel Estimation Errors for Internet of Things , 2020, IEEE Transactions on Information Forensics and Security.

[12]  Tongtong Li,et al.  Physical layer security of multiband communications under hostile jamming , 2017, 2017 International Conference on Computing, Networking and Communications (ICNC).

[13]  Kerstin Vogler,et al.  Table Of Integrals Series And Products , 2016 .