Browse > Article
http://dx.doi.org/10.3837/tiis.2015.03.012

Joint Spectrum and Power Allocation for Green D2D Communication with Physical Layer Security Consideration  

Chen, Hualiang (College of Communications Engineering, PLA University of Science and Technology)
Cai, Yueming (College of Communications Engineering, PLA University of Science and Technology)
Wu, Dan (College of Communications Engineering, PLA University of Science and Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.9, no.3, 2015 , pp. 1057-1073 More about this Journal
Abstract
In this paper, we consider cooperative D2D communications in cellular networks. More precisely, a cellular user leases part of its spectrum to facilitate the D2D communication with a goal of improving the energy efficiency of a D2D pair. However the D2D pair is untrusted to the cellular user, such resource sharing may result in the information of this cellular user unsecured. In order to motivate the cellular user's generosity, this D2D pair needs to help the cellular user maintain a target secrecy rate. To address this issue, we formulate a joint spectrum and power allocation problem to maximize the energy efficiency of the D2D communication while guaranteeing the physical layer security of the cellular user. Then, a theorem is proved to indicate the best resource allocation strategy, and accordingly, an algorithm is proposed to find the best solution to this resource allocation problem. Numerical results are finally presented to verify the validity and effectiveness of the proposed algorithm.
Keywords
Untrusted relay; physical layer security; device-to-device communication; energy efficiency;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 K. Doppler, M. Rinne, C. Wijting, C. B. Ribeiro, and K. Hugl, "Device-to-Device Communication as an Underlay to LTE-Advanced Networks," IEEE Communications Magazine, vol. 47, no. 12, pp. 42-49, 2009.   DOI
2 G. Fodor, E. Dahlman, G. Mildh, S. Parkvall, N. Reider, G. Miklos, Z. Turanyi, "Design Aspects of Network Assisted Device-to-Device Communications," IEEE Communication Magazine, vol. 50, no. 3, pp. 170-177, 2012.   DOI
3 X. Lin, J. G. Andrews, A. Ghosh, and R. Ratasuk, "An Overview of 3GPP Dievice-to-Device Proximity Services," IEEE Communications Magazine, vol. 52, no. 4, pp. 40-48, 2014.   DOI
4 A. Asadi, Q. Wang, and V. Mancuso, "A Survey on Device-to-Device Communication in Cellular Networks," IEEE Transactions on Communications Surveys and Tutorials, vol. 99, no. pp, pp. 1-19, 2014.
5 D. Wu, J. Wang, R. Q. Hu, Y. Cai, and L. Zhou, "Energy-Efficient Resource Sharing for Mobile Device-to-Device Multimedia Communications," IEEE Transactions on Vehicular Technology, vol. 63, no. 5, pp. 2093-2103, 2014.   DOI
6 H. Chen, D. Wu, and Y. Cai, "Coalition Formation Game for Green Resource Management in D2D Communications," IEEE Communications Letters, vol. 18, no. 8, pp. 1395-1398, 2014.   DOI
7 Z. Zhou, M. Dong, K. Ota, J. Wu, and T. Sato, "Energy Efficiency and Spectral Efficiency Tradeoff in Device-to-Device (D2D) Communications," IEEE Wireless Communications Letters, vol. 3, no. 5, pp. 485-488, 2014.   DOI
8 J. Yue, C. Ma, H. Yu, and W. Zhou, "Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks," IEEE Communications Letters, vol. 17, no. 11, pp. 2068-2071, 2013.   DOI
9 H. Zhang, T. Wang, L. Song, and Z. Han, "Radio Resource Allocation for Physical-Layer Security in D2D Underlay Communications," in Proc. of IEEE ICC, pp. 2325-2330. 2014.
10 X. Guan, Y. Cai, and W. Yang, "On the Reliability-Security Tradeoff and Secrecy Throughput in Cooperative ARQ," IEEE Communications Letters, vol. 18, no. 3, pp. 479-482, 2014.   DOI
11 X. Guan, Y. Cai, W. Yang, Y. Cheng, and J. Hu, "Increasing Secrecy Capacity via Joint Design of Cooperative Beamforming and Jamming," KSII Transactions on Internet and Information Systems, vol. 6, no. 4, pp. 1041-1062, 2012.   DOI
12 X. He, and A. Yener, "The Role of an Untrusted Relay in Secret Communication," in Proc. of ISIT, pp. 2212-2216, 2008.
13 N. Milosavljevic, M. Gastpar, and K. Ramchandran, "Secure Communication using an Untrusted Relay via Sources and Channels," in Proc. of ISIT, pp. 2457-2461, 2009.
14 R. Zhang, L. Song, Z. Han, and B. Jiao, "Physical Layer Security for Two-Way Untrusted Relaying with Friendly Jammers," IEEE Transactions on Vehicular Technology, vol. 61, no. 8, pp. 3693-3704, 2012.   DOI
15 J. Lorincz, A. Capone, D. Begusic, "Heuristic Algorithms for Optimization of Energy Consumption in Wireless Access Networks", KSII Transactions on Internet and Information Systems, vol. 5, no. 5, pp. 514-540, 2011.
16 J. Qu, Y. Cai, D. Wu, and H. Chen, "Stackelberg Game Based Power Allocation for Physical Layer Security of Device- to-Device Communication Underlaying Cellular Networks," Frequenz, vol. 68, no. 5-6, pp. 285-295, 2014.