Power control and channel access for physical-layer security of D2D underlay communication

Device-to-device (D2D) communication is a promising technology for 5G wireless communication system. Since D2D communication usually reuses the resource of cellular users, interference management and resource allocation of D2D are the mainly research directions in D2D communication underlay cellular networks. The physical-layer security problem of D2D link is rarely under studied. In this paper, we develop the Stackelberg game frame to model D2D underlay communication in cellular networks. We analyze the equilibrium solution and optimize the power control and channel access of D2D link to maximize the achievable rate of cellular users and the physical-layer secrecy rate of D2D link. We propose a power control and channel access algorithm of D2D link then. Finally, we perform numerical simulations to study the performance of the proposed algorithm.

[1]  Chuan Ma,et al.  Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.

[2]  Vincent K. N. Lau,et al.  Delay-aware cross-layer design for device-to-device communications in future cellular systems , 2014, IEEE Communications Magazine.

[3]  Jiaheng Wang,et al.  Resource Sharing of Underlaying Device-to-Device and Uplink Cellular Communications , 2013, IEEE Communications Letters.

[4]  Olga Galinina,et al.  Cellular traffic offloading onto network-assisted device-to-device connections , 2014, IEEE Communications Magazine.

[5]  Zhu Han,et al.  Radio resource allocation for physical-layer security in D2D underlay communications , 2014, 2014 IEEE International Conference on Communications (ICC).

[6]  Xiaoying Gan,et al.  Secrecy-based channel assignment for device-to-device communication: An auction approach , 2013, 2013 International Conference on Wireless Communications and Signal Processing.

[7]  Rose Qingyang Hu,et al.  Enable device-to-device communications underlaying cellular networks: challenges and research aspects , 2014, IEEE Communications Magazine.

[8]  Wenbo Wang,et al.  Transmission Capacity of D2D Communication under Heterogeneous Networks with Multi-Bands , 2013, 2013 IEEE 77th Vehicular Technology Conference (VTC Spring).

[9]  Raed A. Abd-Alhameed,et al.  Secure device-to-device communication in LTE-A , 2014, IEEE Communications Magazine.

[10]  Xinbing Wang,et al.  Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.

[11]  Bin Xia,et al.  Secure communications of cellular users in device-to-device communication underlaying cellular networks , 2014, 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP).

[12]  Zhu Han,et al.  Game-theoretic resource allocation methods for device-to-device communication , 2014, IEEE Wireless Communications.

[13]  Munnujahan Ara,et al.  Secure communications with D2D cooperation , 2015, 2015 International Conference on Communications, Signal Processing, and their Applications (ICCSPA'15).

[14]  Zhu Han,et al.  Joint scheduling and resource allocation for device-to-device underlay communication , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).