Secure Full-Duplex Device-to-Device Communication

This paper considers full-duplex (FD) device-to-device (D2D) communications in a downlink MISO cellular system in the presence of multiple eavesdroppers. The D2D pair communicate sharing the same frequency band allocated to the cellular users (CUs). Since the D2D users share the same frequency as the CUs, both the base station (BS) and D2D transmissions interfere each other. In addition, due to limited processing capability, D2D users are susceptible to external attacks. Our aim is to design optimal beamforming and power control mechanism to guarantee secure communication while delivering the required quality-of-service (QoS) for the D2D link. In order to improve security, artificial noise (AN) is transmitted by the BS. We design robust beamforming for secure message as well as the AN in the worst-case sense for minimizing total transmit power with imperfect channel state information (CSI) of all links available at the BS. The problem is strictly non-convex with infinitely many constraints. By discovering the hidden convexity of the problem, we derive a rank-one optimal solution for the power minimization problem.

[1]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[2]  Xiang Cheng,et al.  Cooperation via Spectrum Sharing for Physical Layer Security in Device-to-Device Communications Underlaying Cellular Networks , 2016, 2015 IEEE Global Communications Conference (GLOBECOM).

[3]  Carl Wijting,et al.  Device-to-device communication as an underlay to LTE-advanced networks , 2009, IEEE Communications Magazine.

[4]  R. M. A. P. Rajatheva,et al.  Full duplex device-to-device communication in cellular networks , 2014, 2014 European Conference on Networks and Communications (EuCNC).

[5]  Philip Levis,et al.  Practical, real-time, full duplex wireless , 2011, MobiCom.

[6]  Yangyang Zhang,et al.  SWIPT in MISO full-duplex systems , 2017, Journal of Communications and Networks.

[7]  Ashutosh Sabharwal,et al.  Experiment-Driven Characterization of Full-Duplex Wireless Systems , 2011, IEEE Transactions on Wireless Communications.

[8]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[9]  Philip Levis,et al.  Achieving single channel, full duplex wireless communication , 2010, MobiCom.

[11]  Jiaheng Wang,et al.  Security Enhancement via Device-to-Device Communication in Cellular Networks , 2016, IEEE Signal Processing Letters.

[12]  Muhammad R. A. Khandaker,et al.  Wireless information and power transfer in full-duplex communication systems , 2016, 2016 IEEE International Conference on Communications (ICC).

[13]  Chong-Yung Chi,et al.  QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.

[14]  Sachin Katti,et al.  Full duplex radios , 2013, SIGCOMM.

[15]  Sungsoo Park,et al.  Capacity Enhancement Using an Interference Limited Area for Device-to-Device Uplink Underlaying Cellular Networks , 2011, IEEE Transactions on Wireless Communications.

[16]  Muhammad R. A. Khandaker,et al.  Truth-Telling Mechanism for Two-Way Relay Selection for Secrecy Communications With Energy-Harvesting Revenue , 2017, IEEE Transactions on Wireless Communications.

[17]  Nei Kato,et al.  Device-to-Device Communication in LTE-Advanced Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[18]  Muhammad R. A. Khandaker,et al.  Robust Secrecy Beamforming With Energy-Harvesting Eavesdroppers , 2015, IEEE Wireless Communications Letters.

[19]  Christos Masouros,et al.  Constructive interference based secure precoding , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).

[20]  Jörg Ott,et al.  Security and Privacy in Device-to-Device (D2D) Communication: A Review , 2017, IEEE Communications Surveys & Tutorials.

[21]  Muhammad R. A. Khandaker,et al.  Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers , 2015, IEEE Transactions on Information Forensics and Security.

[22]  Muhammad R. A. Khandaker,et al.  Joint Transmit Power and Relay Two-Way Beamforming Optimization for Energy-Harvesting Full-Duplex Communications , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).

[23]  Muhammad R. A. Khandaker,et al.  SWIPT in MISO Multicasting Systems , 2014, IEEE Wireless Communications Letters.