DOI QR코드

DOI QR Code

The Full-Duplex Device-to-Device Security Communication Under the Coverage of Unmanned Aerial Vehicle

  • Zeng, Qian (Beijing Engineering and Technology Center for Convergence Networks and Ubiquitous Services, University of Science and Technology Beijing (USTB)) ;
  • Zhang, Zhongshan (The School of Communication and Electronics in Beijing Institute of Technology (BIT))
  • 투고 : 2018.03.10
  • 심사 : 2018.11.12
  • 발행 : 2019.04.30

초록

Unmanned aerial vehicles (UAVs), acting as mobile base stations (BSs), can be deployed in the typical fifth-generation mobile communications (5G) scenarios for the purpose of substantially enhancing the radio coverage. Meanwhile, UAV aided underlay device-to-device (D2D) communication mode can be activated for further improving the capacity of the 5G networks. However, this UAV aided D2D communication system is more vulnerable to eavesdropping attacks, resulting in security risks. In this paper, the D2D receivers work in full-duplex (FD) mode, which improves the security of the network by enabling these legitimate users to receive their useful information and transmit jamming signal to the eavesdropper simultaneously (with the same frequency band). The security communication under the UAV coverage is evaluated, showing that the system's (security) capacity can be substantially improved by taking advantage of the flexible radio coverage of UAVs. Furthermore, the closed-form expressions for the coverage probabilities are derived, showing that the cellular users (CUs)' secure coverage probability in downlink transmission is mainly impacted by the following three factors: its communication area, the relative position with UAV, and its eavesdroppers. In addition, it is observed that the D2D users or DUs' secure coverage probability is relevant to state of the UAV. The system's secure capacity can be substantially improved by adaptively changing the UAV's position as well as coverage.

키워드

1. Introduction

Unmanned aerial vehicle (UAV), acting as the mobile base station (BS, for which we use & ld quo;UAV&rd quo; to stand for “UAV BS” for short hereinafter) with a flexible radio coverage, haveattracted a wide attention and been already applied in a variant of practical scenarios such asemergency rescue and intelligent transportation. Especially in the typical fifth-generation mobile communications (5G) [1][2], UAV with other advance communication equipment will meet the processing and transmission demands with a number of transmit data.

Device-to-device (D2D) communication has also been widely regarded as a technology for 5G, which can provide the seamless coverage requirements for complementing and enhancing the conventional cellular systems, and has been widely investigated for substantially improving the data rate [3] and resource allocation [4] of the existing wireless networks. Besides the benefits of improving channel capacity and radio coverage, information security is also a critical issue in D2D communications. Thus, guaranteeing the security communication has been regarded as an essential study in D2D-aided networks [5]. Basically, solutions of the optimal joint power control for both the cellular users (CUs) and D2D users (DUs) can be proposed for optimizing the system’s secrecy rate [6]. However, the impact of only a cellulareaves dropper is considered in the above literature, without considering the impact of D2Deaves droppers. In the underlay cellular networks, on the other hand, the eaves dropping behavior is always aimless, and there typically exist multiple eavesdroppers. In this case, anovel selective eavesdropping scenario must be considered to achieve the preset secrecy rate[7], in which scenario the eavesdroppers may arbitrarily choose one target (CU or DU) to overhear. Even that the eavesdroppers are sometimes capable of mitigating the interference viacooperation [8].

In light of the fact that the existed systems are usually operated at the half-duplex (HD) mode (e.g. either time division duplex (TDD) or frequency division duplex (FDD) mode isemployed), their spectral efficiency is much lower than the full-duplex (FD) mode [9], whichenables a concurrent transmission and reception at a single frequency band. However, the existence of self-interference (SI) always hinders the FD development, but the relative lowertransmit power of D2D will allowing more easily SI cancellation. The FD-mode deploymentin D2D communication has been studies for some time [10]. The throughput of FD-mode D2D network have been discussed in [11], and the effects of residual SI and spectral efficiency areanalyzed in [12]. In FD-mode D2D security communication, the BS can allocate a fraction of the total transmitted signal as artificial noise (AN) to degrade the eavesdroppers’ channel, which can be employed for improving the security of the communications, but the FD-mode D2D only share the frequency band allocated to a CU by the BS [13]. In [14], the FD relaynode receives the data and transmits jamming signals at the same time, which has the samedata rate as the HD scheme but significant improving the secrecy performance, but it has not considered the D2D communication. Besides D2D nodes works in FD-mode, the BS also canwork in FD-mode for a secure wireless system, which the secure transmission is ensured to all the users, and also meeting the QoS requirements of the users [15]. In [16], the FD-mode D2D receiver transmits the desired signal and forward the received interference simultaneously to the D2D receiving user to eliminate the interference from the BS, which do not consider the eaves dropper and the overall network performance. To the best of our knowledge, the FD-mode D2D security communication is still needs to be further researched.

In the typical 5G scenarios, UAV aided D2D communications may help to offer aubiquitous radio coverage for many applications, such as vehicular connectivity [17], industrial automation, and urban communications, and so on [18]. For instance, the authors in [19] proposed a UAV aided D2D communication scene to extend the network coverage. By developing a UAV optimal position strategy, the authors in [19] can successfully maximizing the data rate of the network. Regarding D2D mode as an important option of communicationmeans in cellular networks, the authors in [20] proposed a two-mode-selection scheme for UAV aided D2D networks to maximize the connectivity regions of each UAV. Furthermore, the authors in [21] proposed a mobile UAV-aided scheme (considering a disk-shaped covering area) for maximizing the cellular coverage in D2D-aided heterogeneous networks. Evidently, employing multiple UAVs may offer a reasonable way for furthermore improving the radiocoverage. However, co-channel interference is also a problem for consider [22]. In UAV communication, it requires the operators to consider the radio channels’ assignment due to the demand of inter-channel interference mitigation in the presence of a limited number ofor thogonal channels [23].

As we know, as the D2D communication still suffers from a severe security problem, whichalso exists in UAV based systems. In addition, as the UAV moves, the coverage of D2D network can be changed accordingly. For the air-to-ground channel from UAV to the users on the ground, the users receiving signal will also suffer from different security issues. Hence, in D2D based security communication, the channels of both legitimate users and eaves droppers will be impacted by the changing coverage and special channel, making the mobile UAV havean impact on the situation of D2D based security communication.

Meanwhile, although the FD-mode D2D communication was studied [10]-[16], the UAV coverage probability with security/coverage issues in FD-mode D2D networks has still been rarely studied. In this paper, we investigate the above-mentioned problem, with the contributions of this paper reflected as follows:

  • This paper not only considers the UAV’s radio coverage [21], but also investigates thenetwork security issue by adaptively adjusting the UAV’s position.
  • The FD technology is employed in this paper to against the D2D eavesdropping. Unlike [15] in which the base station works in the FD mode, we allow the D2D (its receivers) to work in FD mode (e.g. like in [11]-[13], [16]) to prevent eavesdropping by transmittingjamming signals [14].
  • The closed form expression of the security capacity under the UAV coverage in UAV-based BS is derived, showing that the UAV-based solution not only enhance the CUs communication security, but also increase DUs’ capacity (thus increase the system ’ssum capacity)

The remainder of this paper is organized as follows. The system model is provided in Section 2, followed by closed-form expressions for security and coverage probability in Section 3. In Section 4, we analyze the performance of the proposed scheme. Finally, Section 5 concludes this paper.

2. System Model

As illustrated in Fig. 1, a circular covering area with radius RC is considered for each UAV, which acts as the mobile BS of the system of interest. The vertical position of the serving UAV in each area is denoted by o , with its floating height being h . Furthermore, both the downlink CUs and underlay D2D transmitter are assumed to be located at \(\begin{equation} (r, \phi) \end{equation}\), where r and \(\begin{equation} \phi \end{equation}\) represent the radius and angle in a polar coordinates, respectively, with r′ denoting the distance between o and the D2D receiver. In addition, the densities of CUs and DUs areassumed to be λc and λd, respectively, which follow homogeneous poisson point process(PPP) distribution Φc and Φd , respectively [26]. Note that in the proposed model the densities of eavesdroppers corresponding to each CU and DU can be represented as λec and λed , respectively. Apparently, both of the above-mentioned eavesdroppers followhomogeneous PPP distribution with\(\begin{equation} \lambda_{c}=\lambda_{e c} \end{equation}\) and \(\begin{equation} \lambda_{d}=\lambda_{e d} \end{equation}\), respectively. Without loss of generality, we assume that each CU has its own eavesdropper, while the D2D eaves droppers must be associated with a D2D pair rather than a single DU. Meanwhile, we also assume that the distance between each pair of D2D peers is kept fixed in an isotropic direction [27], with \(\begin{equation} d_{e c 0}, d_{e d 0} \end{equation}\) and d0 representing the distance between CU and its eavesdropper, the distance between D2D pair and its eavesdropper, and the distance between the D2D pair transmitterand receiver. Finally, to prevent eavesdropping, we assume that the D2D receivers work in FD mode1 to transmit jamming signal when they receiving the useful signals from their corresponding transmitters. We also assume that a perfect channel state information (CSI) is available in each node of interest2.

2.1 The Channel Model of UAV-aided Networks

The proposed UAV-aided network has a typical three-dimensional (3D) architecture. In particular, when we consider the two-dimensional (2D) component of this network (i.e. on the ground), the channel attenuation between two nodes is typically assumed follow the Rayleigh distribution with unit average power, i.e. ~ exp(1) g . Unlike the ground-based channels, the air-to-ground channel experiences both large-scale and small-scale fading, where we assumethat the small-scale fading in the air-to-ground channel is identical to that in the ground channel [21], [30]. The received signal from the serving UAV can be expressed:

\(\begin{equation} I_{U, i}=\left\{\begin{array}{ll} {P_{U, i}\left|X_{U, i}\right|^{-\alpha_{n}} g_{U, i},} & {L o S} \\ {\eta P_{U, i}\left|X_{U, i}\right|^{-\alpha_{n}} g_{U, i},} & {N L o S} \end{array}\right. \end{equation}\)       (1)

  • where i denotes the receiver, \(\begin{equation} \left|X_{U, i}\right|=\sqrt{h^{2}+r^{2}} \end{equation}\) and the elevation angle is denoted by \(\begin{equation} \theta=(180 / \pi) \arcsin \left(h /\left|X_{u}\right|\right) \end{equation}\). The probability of happening line-of-sight (LoS) propagation represented \(\begin{equation} P_{L}=1 /(1+C \exp [-B(\theta-C)]) \end{equation}\), while the probability forappearing non-line-of-sight (NLoS) propagation is given by \(\begin{equation} P_{N L}=1-P_{L} \end{equation}\) [31], where η is the excessive attenuation factor for NLoS, and αu denotes the path loss exponent, C and B are parameters which depend on the environment (rural, urban, dense urban, or others).

 

Fig. 1. UAV-aided D2D communications scenario, comprising downlink legitimate CUs, DUs andeaves droppers.

2.2 The Received Signal-to-Interference-plus-Noise-Ratio

Following the above analysis, we list the expression of Signal-to-Interference-plus-Noise-Ratio (SINR) at different receiving terminals in the proposed UAV aided networks.

At the D2D receiver, the SINR can be expressed:

\(\begin{equation} \gamma_{d}=\frac{P_{d} g_{0} d_{0}^{-\alpha_{d}}}{I_{d}^{d}+I_{d}^{r}+I_{U, r}+I_{m}+N} \end{equation}\)       (2)

where \(\begin{equation} I_{d}^{d}=\sum_{i \neq 0, i \in \Phi_{d}} P_{d} g_{d i} d_{d i}^{-\alpha_{d}} \end{equation}\) and \(\begin{equation} I_{d}^{r}=\sum_{i \neq 0, i \in \Phi_{d}} P_{r} g_{d i} d_{d i}^{-\alpha_{d}} \end{equation}\) denote the total interference from the neighboring D2D transmitters and receiver, respectively, \(\begin{equation} I_{U, r} \end{equation}\) is the interference induced by the serving UAV. Following (1), Irr can be regarded as the residual noise after performing self-interference (SI) cancellation. As long as the SI can be cancelled to a tolerable level [28 ], we can readily use \(\begin{equation} I_{m}=P_{r} g_{m} \end{equation}\) to denote the residual SI. Furthermore, \(\begin{equation} \alpha_{d} \end{equation}\) is used to denotethe path loss exponents, and N stands for the average power of additive noise.

The SINR for a D2D eavesdropper can thus be expressed:

\(\begin{equation} \gamma_{e d}=\frac{P_{d} g_{e d 0} d_{e d 0}^{-\alpha_{d}}}{I_{e d}^{d}+I_{e d}^{r}+I_{U, e d}+N} \end{equation}\)       (3)

where \(\begin{equation} I_{e d}^{d}=\sum_{i \neq 0, i \in \Phi_{d}} P_{d} g_{e d i} d_{e d i}^{-\alpha_{d}} \end{equation}\) and \(\begin{equation} I_{e d}^{r}=\sum_{i \neq 0, i \in \Phi_{d}} P_{d} g_{e d i t} \cdot d_{e d i}^{-\alpha_{d}} \end{equation}\) are the total interference fromother D2D transmitters and receiver, respectively, and , \(\begin{equation} I_{U, e d} \end{equation}\) denotes the interference from UAV, as given by (1).

Similarly, the SINR for a CU is given by:

\(\begin{equation} \gamma_{c}=\frac{P_{U, c}}{I_{c}^{d}+I_{c}^{r}+N} \end{equation}\)       (4)

where \(\begin{equation} P_{U, c} \end{equation}\) is the received signal from UAV, as given (1), \(\begin{equation} I_{c}^{d}=\sum_{i \in \Phi_{j}} P_{d} g_{c} d_{c i}^{-\alpha_{j}} \end{equation}\)and \(\begin{equation} I_{c}^{r}=\sum_{i \in \Phi_{d}} P_{r} g_{c i} d_{c i}^{-\alpha_{d}} \end{equation}\) denote the total interference from D2D transmitters and receiver, respectively.

Finally, the SINR for a CU eavesdropper is given by:

\(\begin{equation} \gamma_{e c}=\frac{P_{U, e c}}{I_{e c}^{d}+I_{e c}^{r}+N} \end{equation}\)       (5)

where \(\begin{equation} P_{U, e c} \end{equation}\) is the received signal from UAV, as given by (1), \(\begin{equation} I_{e c}^{d}=\sum_{i \in \Phi_{d}} P_{d} g_{e c i} d_{e c i}^{-\alpha_{d}} \end{equation}\)  and express the total interference from D2 \(\begin{equation} I_{e c}^{r}=\sum_{i \in \Phi_{d}} P_{r} g_{e c c i} d_{e c i}^{-\alpha_{c} i} \end{equation}\)D transmitters and receiver, respectively.

3. Security Communication Under the Coverage of UAV

Next let’s obtain the system’s (security) capacity under the coverage of UAV, which are very meaning ful to the evaluation of the system’s security performance. We first analyze the coverage and security probability for DUs, followed by obtaining the system’s sum data rate. Finally, we analysis the benefit brought about by employing mobile UAV.

In the following, we denote the channel capacity of each user (either CU or D2D) by Cuser, and the channel capacity of the eavesdropper by Ceaves . The average security capacity of each user can be defined:

\(\begin{equation} C_{s}=C_{u s e r}-C_{e a v e s}=\ln \left(\frac{1+\gamma_{u s e r}}{1+\gamma_{e a v e s}}\right) \approx \ln \left(\frac{\gamma_{u s e r}}{\gamma_{e a v e s}}\right) \end{equation}\)       (6)

Denoting the coverage threshold of the system by β, in the case of secure communication under the UAV coverage, the secure capacity of the UAV-aided system is given by:

\(\begin{equation} C_{\mathrm{cov}}=W \log _{2}(\beta) P\left(\frac{\gamma_{\text {user}}}{\gamma_{\text {emes}}} \geq \beta\right) \end{equation}\)       (7)

where W denotes the system bandwidth.

3.1 Coverage and Security Probability for a DU

According to the above-mentioned analysis, from (2), (3) and (6), in the case of securecommunication under the UAV, the coverage of a DU is expressed:

\(\begin{equation} \begin{aligned} P_{\text {cov, }, d}(r, \omega, \beta)=& \mathbb{P}\left(\frac{\gamma_{d}}{\gamma_{e d}} \geq \beta\right)=P_{\text {cov,d }}(r, \beta) \\ =& P_{L d}(r) P_{L e d}(r)\left(1+\frac{\Phi+P_{U} X_{U, r}(r)^{-\alpha_{w}}}{\Phi+P_{U} X_{U, e d}(r)^{-\alpha_{w}}} \Psi \beta\right)^{-1}+\\ & P_{M L d}(r) P_{L e d}(r)\left(1+\frac{\Phi+\eta P_{U} X_{U, r}(r)^{-\alpha_{w}}}{\Phi+P_{U} X_{U, e d}(r)^{-\alpha_{w}}} \Psi \beta\right)^{-1}+\\ & P_{L d}(r) P_{N L e d}(r)\left(1+\frac{\Phi+P_{U} X_{U, r}(r)^{-\alpha_{w}}}{\Phi+\eta P_{U} X_{U, e d}(r)^{-\alpha_{w}}} \Psi \beta\right)^{-1}+\\ & P_{N L d}(r) P_{N L e d}(r)\left(1+\frac{\Phi+\eta P_{U} X_{U, r}(r)^{-\alpha_{n}}}{\Phi+\eta P_{U} X_{U, e d}(r)^{-\alpha_{w}}} \Psi \beta\right)^{-1} \end{aligned} \end{equation}\)       (8)

where \(\begin{equation} X_{U, r}(r)=\sqrt{r^{2}+d_{0}^{2}+h^{2}}, \quad X_{U, \text { ed }}(r)=\sqrt{r^{2}+d_{e d 0}^{2}+h^{2}}, \quad P_{L d}(r), P_{\text {lud}}(r) \end{equation}\)\(\begin{equation} P_{N L d}(r) \end{equation}\) and \(\begin{equation} P_{N L e d}(r) \end{equation}\) are from (1), which are the probability of LoS and NLoS propagation in DU and its eavesdropper in the radius r, \(\begin{equation} \Phi=\frac{-\alpha^{\prime} \pi^{2} \lambda_{d}}{\sin \left(\pi \alpha^{\prime}\right)}\left(P_{d}^{\alpha^{\prime}}+P_{r}^{\alpha^{\prime}}\right)+\sigma_{r, r}^{2}+\sigma_{N}^{2} \end{equation}\)\(\begin{equation} \Psi=\left(\frac{d_{0}}{d_{e d 0}}\right)^{-\alpha_{d}}, \quad \text { and } \quad \alpha^{\prime}=\frac{2}{\alpha} \end{equation}\)

Proof: See Appendix.

Without loss of generality, we consider a uniform distribution of DUs over the coveragearea of a \(\begin{equation} \mathrm{UAV}, \text { i.e. } f(r, \omega)=\frac{r}{\pi R_{C}^{2}} \end{equation}\), where \(\begin{equation} 0 \leq r \leq R_{C} \end{equation}\) and \(\begin{equation} 0 \leq \omega \leq 2 \pi \end{equation}\) . The averagesecure coverage probability for DUs can thus be given by: 

\(\begin{equation} \bar{P}_{\mathrm{cov}, d}(\beta)=\int_{0}^{R_{c}} P_{\mathrm{cov}, d}(r, \beta) f(r, \omega) d r d \omega=\int_{0}^{R_{c}} P_{\mathrm{cov}, d}(r, \beta) \frac{2 r}{R_{C}^{2}} d r \end{equation}\)       (9)

3.2 Coverage and Security Probabilities for CUs

From (4), (5) and (6), the coverage probability with security for a typical CU can be expressed:

\(\begin{equation} \begin{aligned} P_{\text {cov, }}(r, \omega, \beta) &=\mathbb{P}\left(\frac{\gamma_{c}}{\gamma_{e c}} \geq \beta\right) \\ &=\mathbb{P}\left(\frac{P_{U, c}}{I_{c}^{d}+I_{c}^{r}+N} \frac{I_{e c}^{d}+I_{e c}^{r}+N}{P_{U, e c}} \geq \beta\right) \end{aligned} \end{equation}\)       (10)

assuming that \(\begin{equation} \mathbb{E}_{I_{t}^{\prime}, V_{s}^{\prime}}\left(I_{c}^{d}+I_{c}^{r}+N\right)=\mathbb{E}_{I_{s}^{\prime}, t_{s}^{\prime}}\left(I_{e c}^{d}+I_{e c}^{r}+N\right) \end{equation}\), according to appendix, (10) can be simplified as

\(\begin{equation} \mathbb{P}\left[\frac{P_{U, c}}{\mathbb{E}_{I_{c}^{d}, I_{c}^{d}}\left(I_{c}^{d}+I_{c}^{r}+N\right)} \frac{\mathbb{E}_{I_{c}^{d}, L_{e}^{r}}\left(I_{e c}^{d}+I_{e c}^{r}+N\right)}{P_{U, e c}} \geq \beta\right]=P\left(\frac{P_{U, c}}{P_{U, e c}} \geq \beta\right) \end{equation}\), implying that

\(\begin{equation} P\left(\frac{\left|X_{U, c}\right|^{-\alpha_{s}} g_{c}}{\left|X_{U, e c}\right|^{-\alpha_{s}}} \geq \beta\right)=\frac{1}{1+X(r)^{-\alpha_{s}} \beta} \end{equation}\)       (11)

where  \(\begin{equation} X(r)=\frac{X_{U, e c}(r)}{X_{U, e c}(r)}=\sqrt{\frac{r^{2}+h^{2}}{r^{2}+d_{e c 0}^{2}+h^{2}}} \end{equation}\). Consequently, the (secure) coverage of atypical CU can be expressed:

\(\begin{equation} \begin{aligned} P_{\mathrm{cov}, c}(r, \beta) &=P_{L c}(r) P_{L e c}(r) \frac{1}{1+X(r)^{-\alpha_{w}} \beta}+P_{N L c}(r) P_{L e c}(r) \frac{1}{1+\frac{1}{\eta} X(r)^{-\alpha_{u}} \beta} \\ &+P_{L c}(r) P_{N L e c}(r) \frac{1}{1+\eta X(r)^{-\alpha_{u}} \beta}+P_{N L c}(r) P_{N L e c}(r) \frac{1}{1+X(r)^{-\alpha_{u}} \beta} \end{aligned} \end{equation}\)       (12)

where \(\begin{equation} P_{L c}(r), P_{L e c}(r), P_{N L c}(r) \end{equation}\) and\(\begin{equation} P_{N L e c}(r) \end{equation}\) are also from (1), which are the probability of LoS and NLoS propagation in DU and its eavesdropper in the radius r. Similar to (9), the average (secure) coverage probability of a typical CU over a UAV coverage is:

\(\begin{equation} \bar{P}_{\mathrm{cov}, c}(\beta)=\int_{0}^{R_{C}} P_{\mathrm{cov}, c}(r, \beta) \frac{2 r}{R_{C}^{2}} d r \end{equation}\)       (13)

3.3 System Sum-Rate Analysis

From (7), (9) and (13), the average achievable secure data rates for either the CUs and or the DUs can be expressed:

\(\begin{equation} \left\{\begin{array}{l} {\bar{C}_{d}=W \log _{2}(\beta) \bar{P}_{\mathrm{cov}, d}(\beta)} \\ {\bar{C}_{c}=W \log _{2}(\beta) \bar{P}_{\mathrm{cov}, c}(\beta)} \end{array}\right. \end{equation}\)       (14)

Hence, the sum data rate of the whole system is thus given by:

\(\begin{equation} \bar{C}_{s u m}=\pi R_{C}^{2}\left(\lambda_{c} \bar{C}_{c}+\lambda_{d} \bar{C}_{d}\right) \end{equation}\)       (15)

3.4 The Benefits Brought About by Employing Mobile UAV

Under the circular-shaped UAV secure coverage, the formula (9) and (13) have shown that the CU’s secure coverage probability is a function of both h and Rc (but not of Pu ). In this case, the mobile UAV is capable of both providing secure communication enhancement with variant h values and serving area after performing parameter adjustment. Here, we use the method of “stop points” [21], in which the UAV stops at each prescribed stop point and servesthe present downlink users over a given radius. This approach adopts the disk covering method [32] for finding the minimum number of disks over circle Rc , followed by adjusting the height of UAV to ensure both the coverage and security in communications. The example of disk covering is illustrated in Fig. 2, in which the minimum number of stop points M for covering the area was illustrated in [21], [32]. We regard the requirement of coverage probability under the secure communication as the coverage probability that is not less thanthe threshold ε.

 

Fig. 2. Disks covering area of five small circles.

First, we compute the coverage radius of the UAV based on the minimum requirement for the DUs’ coverage probability, which is supposed to be beyond ε:

\(\begin{equation} r_{C}=\max \left\{R | \bar{P}_{\operatorname{cov}, c}(\beta) \geq \varepsilon, R_{C}, h\right\}=\bar{P}_{\mathrm{cov}, c}^{-1}(\beta, \varepsilon) \end{equation}\)       (16)

Note that only the users within the coverage of circle rC are allowed to be activated in the proposed scheme. The minimum number of stop points for the full coverage is thus given by:

\(\begin{equation} L=\min \{M\}, \quad R_{\min , L} \leq r_{C} \leq R_{\min , L-1} \end{equation}\)       (17)

provided that

\(\begin{equation} \bar{P}_{\mathrm{cov}, c}\left(\beta, h, R_{\min , L}\right) \geq \varepsilon \end{equation}\)       (18)

is satisfied, where L denotes the minimum number of stop points,\(\begin{equation} R_{\min , L} \end{equation}\) is the radiuscorresponding to L smaller circles. After calculating \(\begin{equation} R_{\min , L} \end{equation}\), we may readily adjust h foroptimizing the performance of the system. The optimal height of UAV can be calculated:

\(\begin{equation} h_{o p t}=\underset{h}{\arg \min }\left\{\bar{P}_{\operatorname{cov}, c}^{-1}(\beta, \varepsilon)=R_{\min , L} | h\right\} \end{equation}\)       (19)

4. Simulation Results and Analysis

In this section, let’s first compare our analytical results with the numerical results, for which the simulation parameters are summarized in Table 1. (following [21], [25]).

The proposed scheme for HD mode and FD mode in simulation performance is shown in Fig. 3, which shows the coverage probability of CU and DU. As we can see, the result are very close, the reason is that as the DUs work in the underlay cellular networks, they would have been interfere with each other no matter the existence of eavesdroppers. So, when one of the DU in its pair works in FD mode, it not only interferes with its eavesdroppers, but alsointerfere themselves.

Table 1. Part of fundamental properties of self-organization network

 

 

Fig. 3. The proposed scheme for HD mode and FD mode in simulation performance.

In Fig. 4, it gives out the secure coverage probabilities of both the DUs and CUs for variant thresholds, \(\begin{equation} \text { i.e. } \lambda_{c}=1 \times 10^{-4} \mathrm{m}^{2}, \quad P_{d}=P_{r}=0.05 W, P_{U}=3 W, h=50 \mathrm{m} \end{equation}\) and \(\begin{equation} R_{C}=300 \mathrm{m} \end{equation}\). It is shown that the analytical results for both users match the simulation results, especially with larger β values. Meanwhile, it also shows that the secure coverage probabilities for both users will decrease as β increases. Furthermore, from (9) and (13), it is shown that the CU’s secure coverage probability is only relate to the relative position with UAV and their eavesdroppers, and the scope of communication area. While the securecoverage of DUs are affected by many parameters, as the impact of \(\begin{equation} d_{0}, d_{e d} \end{equation}\)  and \(\begin{equation} d_{e c} \end{equation}\) are obvious, we will not analyze these parameters for simplify.

 

Fig. 4. Coverage probability vs. β of the proposed scheme.

 

Fig. 5. Coverage probability for DUs vs. \(\begin{equation} P_{U} \text { and } \lambda_{d} \end{equation}\) of the proposed scheme.

In Fig. 5, it evaluates the impact of both Pu and λd on DUs. To guarantee a security communication, the coverage probability of DUs is a monotonically increasing function of Pu , implying that the UAV is capable of producing interference to D2D eavesdroppers, thusimproving the system’s secure capacity.

In Fig. 6, we evaluate the coverage probability of DUs under variant Pd and Pr . It is worthnoting that the coverage probability will be inversely proportional to the transmit power (as thelatter produces interference to the users), so decreasing DUs’ transmit power will not only increase their energy efficiency, but also increase their coverage probability.

 

Fig. 6. Coverage probability for DUs vs. \(\begin{equation} P_{d} \text { and } P_{r} \end{equation}\) of the proposed scheme.

In Fig. 7 and Fig. 8, the impacts of Rc and h on CUs and DUs’ coverage probability are evaluated. In particular, in Fig. 7, smaller communication area implies a higher CUs’ coverage probability, while a lower altitude of UAV makes it decreased. In Fig. 8, on the other hand, itis shown that the DUs’ coverage probability increases as h decreases, similar to Fig. 5. Whenthe communication area becomes larger, the coverage probability will be a monotonically decreasing function of the area with an increasing logarithmic function with small range.

 

Fig. 7. Coverage probability for CUs vs. h and RC of the proposed scheme.

 

Fig. 8. Coverage probability for DUs vs. h and RC  of the proposed scheme.

Fig. 9 and Fig. 10 are show separately the stop points and average sum capacity changes insecure communication under the coverage of a mobile UAV and a static UAV with ε= 0.15, at this time, \(\begin{equation} \lambda_{c}=1 \times 10^{-4} \mathrm{m}^{2} \end{equation}\) , \(\begin{equation} \lambda_{d}=0.5 \times 10^{-4} \mathrm{m}^{2} \end{equation}\) , 0 30 d m = . The results in the two figures with the same color correspond to the same simulation parameters. From Fig. 9, whenh = 100 , the changes of stop points are the same (black, green and red curves), when h decrease to 80, the number of stop points increased (blue curves), that is the length of h affects the change of stop points. And corresponds to Fig. 10, the sum capacity increased (black and blue curves), at the time, the users’ densities are the same. Meanwhile, it can be seen from Fig. 7 and Fig. 8 that the influence of h on D2D user and DU are opposite, that is lower h increase D2D users’ capacity and decrease CUs’, but the sum system capacity is increasing. At the same time, when D2D users’ density or CUs’ is half of each other (green or magenta curve), the sum capacity in the system is lower than before. Therefore, to improve the sum capacity of the system, the density of D2D users’ and CUs’ should be equal and h should reduce.

Fig. 9 and Fig. 10 are show separately the stop points and average sum capacity changes insecure communication under the coverage of a mobile UAV and a static UAV with ε= 0.15, at this time, \(\begin{equation} \lambda_{c}=1 \times 10^{-4} \mathrm{m}^{2}, \quad \lambda_{d}=0.5 \times 10^{-4} \mathrm{m}^{2}, d_{0}=30 \mathrm{m} \end{equation}\) . The results in the two figures with the same color correspond to the same simulation parameters. From Fig. 9, when 100 h = 100 m, the changes of stop points are the same (black, green and red curves), when h decrease to 80, the number of stop points increased (blue curves), that is the length of h affects the change of stop points. And corresponds to Fig. 10, the sum capacity increased (black and blue curves), at the time, the users’ densities are the same. Meanwhile, it can be seen from Fig. 7 and Fig. 8 that the influence of h on D2D user and DU are opposite, that is lower h increase D2D users’ capacity and decrease CUs’, but the sum system capacity is increasing. At the same time, when D2D users’ density or CUs’ is half of each other (green or magenta curve), the sum capacity in the system is lower than before. Therefore, to improve the sum capacity of the system, the density of D2D users’ and CUs’ should be equal and h should reduce.

The “disk coverage” solutions can enhance the system capacity even in the presence of eaves dropping. At the same time, from Section 3.4, the “disk coverage” solution is capable of keeping the CUs coverage at a constant value while do not decrease with RC , so that the performance improvement in terms of sum capacity actually comes from the contribution of D2D users. Consequently, the mobile UAV solution not only enhances the system’s security, but also increases the sum capacity.

 

Fig. 9. The stop points change under the coverage of mobile UAV-based BS.

 

Fig. 10. The average sum capacity of the proposed scheme.

5. Conclusion

In this paper, we consider the security problem of UAV coverage FD D2D network, and obtain the expressions of system capacity under the UAV coverage. In the situation, both CUs and DUs assumed to suffer from eavesdropping. To guarantee a secure communication, an FD mode D2D receiver employed for transmitting jamming signal to its eavesdropper.

Furthermore, the expressions show that the secure coverage probability in CUs is a function of the relative position of UAV, and a larger received power from UAV implies a higher securecoverage probability in DUs.

Appendix

The probability \(\begin{equation} P_{\mathrm{cov}, d}(r, \omega, \beta) \end{equation}\) can be calculated:

\(\begin{equation} \begin{aligned} P_{\text {cov,d }}(r, \omega, \beta) &=\mathbb{P}\left(\frac{\gamma_{d}}{\gamma_{\text {ed}}} \geq \beta\right) \\ &=\mathbb{P}\left(\frac{P_{d} g_{0} d_{0}^{-\alpha_{d}}}{I_{d}^{d}+I_{d}^{r}+I_{U, r}+I_{r r}+N} \frac{I_{e d}^{d}+I_{e d}^{r}+I_{U, e d}+N}{P_{d} g_{e d 0} d_{e d}^{-\alpha_{d}}} \geq \beta\right) \end{aligned} \end{equation}\)\(\begin{equation} \begin{aligned} &=P\left[\frac{\mathbb{E}_{I_{e d}^{d}, I_{e d}^{r}, I_{U, c d}}\left(I_{e d}^{d}+I_{e d}^{r}+I_{U, e d}+N\right)}{\mathbb{E}_{I_{d}^{d}, I_{d}^{r}, I_{U, r}}\left(I_{d}^{d}+I_{d}^{r}+I_{U, r}+I_{r r}+N\right)}\left(\frac{d_{0}}{d_{e d 0}}\right)^{-\alpha_{d}} \frac{g_{0}}{g_{e d 0}} \geq \beta\right]\\ &=\frac{1}{1+\frac{\mathbb{E}_{I_{d}^{d}, I_{d}^{\prime}, I_{U, r}}\left(I_{d}^{d}+I_{d}^{r}+I_{U, r}+I_{r r}+N\right)}{\mathbb{E}_{I_{c d}^{d}, I_{d d}^{r}, L_{U, c d}}\left(I_{e d}^{d}+I_{e d}^{r}+I_{U, e d}+N\right)}\left(\frac{d_{0}}{d_{e d 0}}\right)^{-\alpha_{d}} \beta} \end{aligned} \end{equation}\)        (20)

Following the PPP distribution, the interference imposed on the D2D receivers due to theneighboring users is independent of their locations. The expectations of the interference can becalculated:

\(\begin{equation} \begin{aligned} &\mathbb{E}_{I_{d}^{d}, I_{d}^{r}, I_{U, r}}\left(I_{d}^{d}+I_{d}^{r}+I_{U, r}+I_{r r}+N\right)\\ &=\mathbb{E}_{d_{d i}}\left(I_{d}^{d}\right)+\mathbb{E}_{d_{d i}}\left(I_{d}^{r}\right)+\mathbb{E}\left(I_{U, r}\right)+I_{r r}+N \end{aligned} \end{equation}\)       (21)

and

\(\begin{equation} \begin{aligned} &\mathbb{E}_{I_{e d}^{d}, I_{e d}^{r}, I_{U, c d}}\left(I_{e d}^{d}+I_{e d}^{r}+I_{U, e d}+N\right)\\ &=\mathbb{E}_{d_{e d}}\left(I_{e d}^{d}\right)+\mathbb{E}_{d_{d d}}\left(I_{e d}^{r}\right)+\mathbb{E}\left(I_{U, e d}\right)+N \end{aligned} \end{equation}\)       (22)

The first part of (21) is given by:

\(\begin{equation} \mathbb{E}_{d_{d i}}\left(I_{d}^{d}\right)=\mathbb{E}_{I_{d}^{d}}\left(\sum_{i \neq 0} P_{d} g_{d i} d_{d i}^{-\alpha_{d}}\right)=\mathbb{E}_{d_{d i}}\left\{\ln \left[\exp \left(\sum_{i \neq 0} P_{d} g_{d i} d_{d i}^{-\alpha_{d}}\right)\right]\right\} \end{equation}\)       (23)

For an exponential function, we can calculate its mean value:

\(\begin{equation} \begin{aligned} &\mathbb{E}_{d_{d i}}\left[\exp \left(\sum_{i \neq 0} P_{d} g_{d i} d_{d i}^{-\alpha_{d}}\right)\right]=\mathbb{E}_{d_{d i}}\left[\prod_{i \neq 0} \exp \left(P_{d} g_{d i} d_{d i}^{-\alpha_{d}}\right)\right]\\ &=\mathbb{E}_{d_{d i}}\left[\prod_{i \neq 0} \int_{0}^{\infty} e^{P_{d} d_{d i}^{-a_{d}} x} e^{-x} d x\right]=\mathbb{E}_{d_{d i}}\left[\prod_{i \neq 0} \frac{1}{1-P_{d} d_{d i}^{-\alpha_{d}}}\right]\\ &\stackrel{(a)}{=} \exp \left[-\lambda_{d} \int_{0}^{\infty}\left(1-\frac{1}{1-P_{d} d_{d i}^{-\alpha_{d}}}\right) 2 \pi x d x\right]\\ &=\exp \left[\frac{-\alpha^{\prime} \pi^{2} \lambda_{d}\left(P_{d}\right)^{\alpha^{\prime}}}{\sin \left(\pi \alpha^{\prime}\right)}\right] \end{aligned} \end{equation}\)       (24)

where  \(\begin{equation} \alpha^{\prime}=\frac{2}{\alpha} \end{equation}\), and step (a) follows [33]. Taking the result into Logarithmic function, (23)  becomes:

\(\begin{equation} \mathbb{E}_{d_{d}}\left(I_{d}^{d}\right)=\frac{-\alpha^{\prime} \pi^{2} \lambda_{d} P_{d}^{\alpha^{\prime}}}{\sin \left(\pi \alpha^{\prime}\right)} \end{equation}\)       (25)

From (24), the second item of (21) becomes:

\(\begin{equation} \mathbb{E}_{d_{d i}}\left(I_{d}^{r}\right)=\frac{-\alpha^{\prime} \pi^{2} \lambda_{d} P_{r}^{\alpha^{\prime}}}{\sin \left(\pi \alpha^{\prime}\right)} \end{equation}\)        (26)

Assume that the D2D receiver is located inside the circle with radius d0 in its transmitter, we have \(\begin{equation} \mathbb{E}\left(r^{\prime}\right)^{2}=\frac{1}{\pi} \int_{0}^{\pi}\left(r^{2}+d_{0}^{2}-2 r d_{0} \cos (\omega)\right) d \omega=r^{2}+d_{0}^{2} \end{equation}\). Therefore, the averagedistance between UAV and D2D receiver is \(\begin{equation} X_{U, r}(r)^{2}=\mathbb{E}\left(r^{\prime}\right)^{2}+h^{2}=r^{2}+d_{0}^{2}+h^{2} \end{equation}\) . Furthermore, the third item of (21) can be calculated:

\(\begin{equation} \mathbb{E}\left(r^{\prime}\right)^{2}=\frac{1}{\pi} \int_{0}^{\pi}\left(r^{2}+d_{0}^{2}-2 r d_{0} \cos (\omega)\right) d \omega=r^{2}+d_{0}^{2} \end{equation}\)       (27)

Hence, (21) can be rewritten:

\(\begin{equation} \begin{aligned} &\mathbb{E}_{I_{d}^{d}, I_{d}^{r}, I_{U, r}}\left(I_{d}^{d}+I_{d}^{r}+I_{U, r}+I_{r r}+N\right)\\ &=\frac{-\alpha^{\prime} \pi^{2} \lambda_{d}}{\sin \left(\pi \alpha^{\prime}\right)}\left(P_{d}^{\alpha^{\prime}}+P_{r}^{\alpha^{\prime}}\right)+\mathbb{E}\left[I_{U, r}(r)\right]+\sigma_{r, r}^{2}+\sigma_{N}^{2} \end{aligned} \end{equation}\)       (28)

According to the previous equation, the interference (22) becomes:

\(\begin{equation} \begin{aligned} &\mathbb{E}_{I_{e d}^{d}, I_{e d}^{r}, I_{U, e d}}\left(I_{e d}^{d}+I_{e d}^{r}+I_{U, e d}+N\right)\\ &=\frac{-\alpha^{\prime} \pi^{2} \lambda_{d}}{\sin \left(\pi \alpha^{\prime}\right)}\left(P_{d}^{\alpha^{\prime}}+P_{r}^{\alpha^{\prime}}\right)+\mathbb{E}\left[I_{U, e d}(r)\right]+\sigma_{N}^{2} \end{aligned} \end{equation}\)       (29)

\(\begin{equation} \begin{array}{l} {\text { where } \mathbb{E}_{d_{\text {ed}}}\left(I_{\text {ed}}^{d}\right)=\frac{-\alpha^{\prime} \pi^{2} \lambda_{d} P_{d}^{\alpha^{\prime}}}{\sin \left(\pi \alpha^{\prime}\right)}, \mathbb{E}_{d_{\text {ed}}}\left(I_{e d}^{r}\right)=\frac{-\alpha^{\prime} \pi^{2} \lambda_{d} P_{r}^{\alpha^{\prime}}}{\sin \left(\pi \alpha^{\prime}\right)}} \\ {\mathbb{E}\left[I_{U, e d}(r)\right]=\left\{\begin{array}{ll} {P_{U} X_{U, e d}(r)^{-\alpha_{u}},} & {\text { and } X_{U, e d}(r)^{2}=r^{2}+d_{\text {ed} 0}^{2}+h^{2}} \\ {\eta P_{U} X_{U, e d}(r)^{-\alpha_{u}},} & {\text { NLOS }} \end{array}\right.} \end{array} \end{equation}\)

Therefore, in the case of secure communication, the coverage of a single DU can be given by:.

\(\begin{equation} \begin{aligned} &P_{\text {cov,d }}(r, \omega, \beta)=\mathbb{P}\left(\frac{\gamma_{d}}{\gamma_{e d}} \geq \beta\right)=P_{\text {cov, }, d}(r, \beta)\\ &=P_{L d}(r) P_{L e d}(r)\left(1+\frac{\Phi+P_{U} X_{U, r}(r)^{-\alpha_{u}}}{\Phi+P_{U} X_{U, e d}(r)^{-\alpha_{u}}} \Psi \beta\right)^{-1}+\\ &P_{N L d}(r) P_{L e d}(r)\left(1+\frac{\Phi+\eta P_{U} X_{U, r}(r)^{-\alpha_{u}}}{\Phi+P_{U} X_{U, e d}(r)^{-\alpha_{u}}} \Psi \beta\right)^{-1}+\\ &P_{L d}(r) P_{N L e d}(r)\left(1+\frac{\Phi+P_{U} X_{U, r}(r)^{-\alpha_{u}}}{\Phi+\eta P_{U} X_{U, e d}(r)^{-\alpha_{u}}} \Psi \beta\right)^{-1}+\\ &P_{N L d}(r) P_{N L e d}(r)\left(1+\frac{\Phi+\eta P_{U} X_{U, r}(r)^{-\alpha_{u}}}{\Phi+\eta P_{U} X_{U, e d}(r)^{-\alpha_{u}}} \Psi \beta\right)^{-1} \end{aligned} \end{equation}\)       (30)

where \(\begin{equation} X_{U, r}(r)=\sqrt{r^{2}+d_{0}^{2}+h^{2}}, \quad X_{U, e d}(r)=\sqrt{r^{2}+d_{e d 0}^{2}+h^{2}}, \quad P_{L d}(r), \quad P_{\text {lead}}(r) \end{equation}\)(\(\begin{equation} P_{N L d}(r) \text { and } P_{N L e d}(r) \end{equation}\)are from (1), which are the probability of LoS and NLoSpropagation in DU and its eavesdropper in the radius

\(\begin{equation} r, \Phi=\frac{-\alpha^{\prime} \pi^{2} \lambda_{d}}{\sin \left(\pi \alpha^{\prime}\right)}\left(P_{d}^{\alpha^{\prime}}+P_{r}^{\alpha^{\prime}}\right)+\sigma_{r, r}^{2}+\sigma_{N}^{2} \end{equation}\),\(\begin{equation} \Psi=\left(\frac{d_{0}}{d_{e d 0}}\right)^{-\alpha_{d}}, \text { and } \alpha^{\prime}=\frac{2}{\alpha} \end{equation}\)

참고문헌

  1. X. Ge, S. Tu, G. Mao, et al., "5G Ultra-Dense Cellular Networks," IEEE Wireless Communications, Vol. 23, No. 1, pp.72-79, 2016. https://doi.org/10.1109/MWC.2016.7422408
  2. J. An, K. Yang, J. Wu, N. Ye, S. Guo, and Z. Liao, "Achieve sustainable ultra-dense heterogeneous networks for 5G," IEEE Communications Magazine, vol. 55, no. 12, pp. 84-90, Dec. 2017. https://doi.org/10.1109/mcom.2017.1700410
  3. J. Sun, T. Liu, X. Wang, C. Xing, H. Xiao, A. V. Vasilakos, and Z. Zhang, "Optimal mode selection with uplink data rate maximization for D2D-aided underlaying cellular networks," IEEE Access, vol. 4, pp. 8844-8856, 2016. https://doi.org/10.1109/ACCESS.2016.2631243
  4. J. Sun, Z. Zhang, H. Xiao, C. Xing, "Uplink interference coordination management with power control for D2D underlaying cellular networks: modeling, algorithms and analysis," IEEE Transactions on Vehicular Technology, vol.67, no. 9, pp. 8582-8594, 2018. https://doi.org/10.1109/TVT.2018.2853602
  5. P. Gandotra, R. K. Jha, and S. Jain, "A survey on device-to-device (D2D) communication: architecture and security issues," Journal of Network and Computer Applications, vol. 78, pp. 9-29, 2017. https://doi.org/10.1016/j.jnca.2016.11.002
  6. J. Wang, Q. Tang, C. Yang, R. Schober, and J. Li, "Security enhancement via Device-to-device communication in cellular networks," IEEE Signal Processing Letters, vol. 23, no. 11, pp. 1622-1626, 2016. https://doi.org/10.1109/LSP.2016.2611614
  7. W. Mei, Z. Chen, J. Fang, and B. Fu, "Secure D2D-enabled cellular communication against selective eavesdropping," in Proc. of IEEE International Conference on Communications (ICC), pp. 1-7, 2017.
  8. B. Zhong, Z. Zhang, "Secure full-duplex two-way relaying networks with optimal relay selection," IEEE Communications Letters, vol. 21, no. 5, pp. 1123-1126, 2017. https://doi.org/10.1109/LCOMM.2017.2655050
  9. B. Zhong, Z. Zhang, "Opportunistic two-way full-duplex relay selection in underlay cognitive networks," IEEE System Journal, vol. 12, no. 1, pp. 725-734, 2018. https://doi.org/10.1109/JSYST.2016.2514601
  10. K. S. Ali, H. ElSawy, and M.-S. Alouini, "Modeling cellular networks with full-duplex D2D communication: A stochastic geometry approach," IEEE Transactions on Communications, vol. 64, no. 10, pp. 4409-4424, 2016. https://doi.org/10.1109/TCOMM.2016.2601912
  11. X. Chai, T. Liu, C. Xing, H. Xiao, and Z. Zhang, "Throughput improvement in cellular networks via full-duplex based device-to-device communications," IEEE Access, vol. 4, pp. 7645-7657, 2016. https://doi.org/10.1109/ACCESS.2016.2619379
  12. H. Bagheri, F. A. M. Bonomi, and M. Katz, "Spectral efficiency and throughput enhancement by full-duplex D2D communication in mobile clouds," in Proc. of 21th European Wireless Conference. VDE, pp. 1-6, 2015.
  13. M. R. Khandaker, C. Masouros, and K.-K. Wong, "Secure full-duplex Device-to-device communication," in Proc. of IEEE Globecom Workshops, pp. 1-6, 2017.
  14. G. Chen, G. Yu, P. Xiao, and J. A. Chambers, "Physical layer network security in the full-duplex relay system," IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 574-583, 2015. https://doi.org/10.1109/TIFS.2015.2390136
  15. Y. Sun, D. W. K. Ng, J. Zhu, and R. Schober, "Multi-objective optimization for robust power efficient and secure full duplex wireless communication systems," IEEE Transactions on Wireless Communications, vol. 15, no. 8, pp. 5511-5526, 2016. https://doi.org/10.1109/TWC.2016.2560815
  16. S. Han, P. Chen, and C. Yang, "Full duplex assisted interference suppression for underlay device-to-device communications," in Proc. of IEEE Globecom Workshops, pp. 851-856, 2014.
  17. X. Ge, Z Li, S. Li. "5G software defined vehicular networks," IEEE Communications Magazine, vol. 55, no. 7, pp. 87-93, 2017. https://doi.org/10.1109/MCOM.2017.1601144
  18. A. Orsino, A. Ometov, G. Fodor, D. Moltchanov, L. Militano, S. Andreev, O. N. Yilmaz, T. Tirronen, J. Torsner, G. Araniti, et al., "Effects of heterogeneous mobility on D2D-and drone-assisted mission-critical MTC in 5G," IEEE Communications Magazine, vol. 55, no. 2, pp. 79-87, 2017. https://doi.org/10.1109/MCOM.2017.1600443CM
  19. X. Li, D. Guo, H. Yin, and G. Wei, "Drone-assisted public safety wireless broadband network," in Proc. of IEEE Wireless Communications and Networking Conference Workshops (WCNCW), pp. 323-328, 2015.
  20. A. Omri, M. O. Hasna, and M. Z. Shakir, "Mode selection schemes for D2D enabled aerial networks," arXiv preprint arXiv:1711.02220, pp.1-4, 2017.
  21. M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, "Unmanned aerial vehicle with underlaid device-to-device communications: Performance and tradeoffs," IEEE Transactions on Wireless Communications, vol. 15, no. 6, pp. 3949-3963, 2016. https://doi.org/10.1109/TWC.2016.2531652
  22. X. Ge, K. Huang, C. X. Wang, et al. "Capacity analysis of a multi-cell multi-antenna cooperative cellular network with co-channel interference," IEEE Transactions on Wireless Communications, vol. 10, no. 10, pp. 3298-3309, 2011. https://doi.org/10.1109/TWC.2011.11.101551
  23. F. Tang, Z. M. Fadlullah, N. Kato, F. One, and R. Miura, "AC-POCA: Anti-coordination game based partially overlapping channels assignment in combined UAV and D2D-Based networks," IEEE Transactions on Vehicular Technology, vol. 67, no. 2, pp. 1672-1683, 2018. https://doi.org/10.1109/TVT.2017.2753280
  24. Y. Chang, H. Chen, and F. Zhao, "Energy efficiency maximization of full-duplex two-way relay-assisted device-to-device communications underlaying cellular networks," EURASIP Journal on Wireless Communications and Networking, vol. 2016, no. 1, 2016.
  25. B. Zhong, J. Zhang, Q. Zeng, and X. Dai, "Coverage probability analysis for full-duplex relay aided device-to-device communications networks," China Communications, vol. 13, no. 11, pp. 60-67, 2016. https://doi.org/10.1109/CC.2016.7781718
  26. M. Haenggi, "Stochastic geometry for wireless networks," Cambridge University Press, 2012.
  27. N. Lee, X. Lin, J. G. Andrews, and R. W. Heath, "Power control for D2D underlaid cellular networks: modeling, algorithms, and analysis," IEEE Journal on Selected Areas in Communications, vol. 33, no. 1, pp. 1-13, 2015. https://doi.org/10.1109/JSAC.2014.2369612
  28. Z. Zhang, K. Long, A. V. Vasilakos, and L. Hanzo, "Full-duplex wireless communications: challenges, solutions and future research directions," IEEE Proceedings, vol. 104, no. 7, pp. 1369-1409, 2016. https://doi.org/10.1109/JPROC.2015.2497203
  29. H. Cui, M. Ma, L. Song, and B. Jiao, "Relay selection for two-way full duplex relay networks with amplify-and-forward protocol," IEEE Transactions on Wireless Communications, vol. 13, no. 7, pp. 3768-3777, 2014. https://doi.org/10.1109/TWC.2014.2322607
  30. X. Qi, B. Li, Z. Chu, K. Huang, and H. Chen, "Secrecy energy efficiency performance in communication networks with mobile sinks," Physical Communications, vol. 32, pp. 41-49, 2019. https://doi.org/10.1016/j.phycom.2018.06.009
  31. A. Al-Hourani, S. Kandeepan, and S. Lardner, "Optimal lap altitude for maximum coverage," IEEE Wireless Communications Letters, vol. 3, no. 6, pp. 569-572, 2014. https://doi.org/10.1109/LWC.2014.2342736
  32. R. Kershner, "The number of circles covering a set," American Journal of mathematics, vol. 61, no. 3, pp. 665-671, 1939. https://doi.org/10.2307/2371320
  33. D. Stoyan, S. N. Chiu, W. S. Kendall, et al., "Stochastic geometry and its applications," Journal of the Royal Statistical Society, vol. 151, no. 1, pp. 239-240, 1988.