Secure Transmission Scheme Based on the Artificial Noise in D2D-Enabled Full-Duplex Cellular Networks |
Chen, Yajun
(China National Digital Switching System Engineering and Technological R&D Center)
Yi, Ming (China National Digital Switching System Engineering and Technological R&D Center) Zhong, Zhou (China National Digital Switching System Engineering and Technological R&D Center) Ma, Keming (China National Digital Switching System Engineering and Technological R&D Center) Huang, Kaizhi (China National Digital Switching System Engineering and Technological R&D Center) Ji, Xinsheng (China National Digital Switching System Engineering and Technological R&D Center) |
1 | Fodor G, Roger S, Rajatheva N, et al., "An Overview of Device-to-Device Communications Technology Components in METIS," IEEE Access, vol.4, pp. 3288-3299, 2016. DOI |
2 | K. Doppler, M. Rinne, C. Wijting, et al., "Device to-device communication as an underlay to LTE-Advanced networks," IEEE Communication Magazine, vol.47, no.12, pp. 42-49, 2009. DOI |
3 | G. Fodor, E. Dahlman, G. Mildh, et al., "Design aspects of network assisted device-to-device communications," IEEE Communication Magazine, vol.50, no.3, pp.170-77, 2012. DOI |
4 | B. Li, Z. Fei, Z. Chu, Y. Zhang, "Secure Transmission for Heterogeneous Cellular Networks with Wireless Information and Power Transfer," IEEE Systems Journal, vol.12, no.4, pp. 3755-3766, 2018. DOI |
5 | B. Li, Z. Fei, Z. Chu, et al., "Robust Chance-Constrained Secure Transmission for Cognitive Satellite-Terrestrial Networks," IEEE Transactions on Vehicular Technology, vol.67, no.5, pp.4208-4219, 2018. DOI |
6 | B. Li, Z. Fei, X. Xu, et al., "Resource Allocations for Secure Cognitive Satellite Terrestrial Networks," IEEE Wireless Communications Letters, vol.7, no.1, pp.78-81, 2018. DOI |
7 | B. Li, X. Qi, K. Huang, Z. Fei, F Zhou, R. Hu, "Security-Reliability Tradeoff Analysis for Cooperative NOMA in Cognitive Radio Networks," IEEE Transactions on Communications, vol.67, no.1, pp.83-96, 2019. DOI |
8 | Y. Chen, X. Ji, K. Huang, et al., "Opportunistic access control for enhancing security in D2D-enabled cellular networks," SCIENCE CHINA Information Sciences, vol. 61, no. 4, 042304:1-12, April. 2018. |
9 | Z. Chu, F. Zhou, P. Xiao, Z. Zhu, et al., "Resource Allocation for Secure Wireless Powered Integrated Multicast and Unicast Services With Full Duplex Self-Energy Recycling," IEEE Transactions on Wireless Communications, vol. 18, no. 1, pp. 620-636, Jan. 2019. DOI |
10 | M. Alam, Y. Du, J. Rodriguez, et al., "Secure Device-to-Device Communication in LTE-A," IEEE Communications Magazine, vol.52, no.4, pp. 66-73, 2014. DOI |
11 | D. Zhu, A. Swindlehurst, S. Fakoorian, et al., "Device-to-device communications: the physical layer security advantage," in Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, 1606-1610, 2014. |
12 | H. Zhang, T. Wang, L. Song, et al., "Radio resource allocation for physical-layer security in D2D underlay communications," in Proc. of IEEE International Conference on Communications (ICC), Sydney, NSW, 2319-2324, 2014. |
13 | B. Day, A. Margetts, D. Bliss, and P. Schniter, "Full-duplex bidirectional MIMO: Achievable rates under limited dynamic range," IEEE Transactions on Signal Processing, vol.60, no.7, pp. 3702-3713, 2012. DOI |
14 | J. Yue, C. Ma, Y. Hui, et al., "Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks," IEEE Communications Letters, vol.17, no.11, pp.2068-2071, 2013. DOI |
15 | J. Yue, C. Ma, H. Yu, et al., "Secrecy-based Channel Assignment for Device-to-Device Communication: An Auction Approach," in Proc. of IEEE International Conference on Wireless Communications & Signal Processing (WCSP), Hangzhou, China, 1-6, 2013. |
16 | Y. Chen, X. Ji, K. Huang, et al., "Artificial noise-assisted physical layer security in D2D-enabled cellular networks," EURASIP Journal on Wireless Communications and Networking, 178, 2017. |
17 | W. Cheng, X. Zhang, and H. Zhang, "Optimal dynamic power control for full-duplex bidirectional-channel based wireless networks," in Proc. of IEEE 32nd INFOCOM, Turin, Italy, 3120-3128, 2013. |
18 | W. Afifi, M. Abdel-Rahman, M. Krunz, et al., "Full-Duplex or Half-Duplex: A Bayesian Game for Wireless Networks with Heterogeneous Self-Interference Cancellation Capabilities," IEEE Transactions on Mobile Computing, vol.17, no.5, pp.1076-1089, 2018. DOI |
19 | V. Nguyen, H. Nguyen, O. Dobre, "A New Design Paradigm for Secure Full-Duplex Multiuser Systems," IEEE Journal on Selected Areas in Communications, vol.36, no.7, pp. 1480-1498, 2018. DOI |
20 | X. Ji, X. Kang, K. Huang, et al., "The full-duplex artificial noise scheme for security of a cellular system," China Communications, vol.12, no. Supplement, pp. 150-156, 2015. |
21 | A. Beck, A. Ben-Tal, and L. Tetruashvili, "Application of the sequential parametric convex approximation method with application to nonconvex truss topology design problems," Journal of Global Optimizaiton, vol.47, no.1, pp. 29-51, 2010. DOI |
22 | M. Li, Y. Guo, K. Huang, et al., "Secure power and subcarrier auction in uplink full-duplex cellular networks," China Communications, vol.12, Supplement, pp. 157-165, 2015. DOI |
23 | G. Chen, Y. Gong, P. Xiao, et al., "Physical layer network security in the full-duplex relay system," IEEE Transactions on Information Forensics and Security, vol.10, no.3, pp. 574-583, 2015. DOI |
24 | S. Goel, I. Negr, "Guaranteeing secrecy using artificial noise," IEEE Transactions on Wireless Communications, vol.7, no.6, pp. 2180-2189, 2008. DOI |
25 | W. Cheng, X. Zhang, H. Zhang, "Optimal Dynamic Power Control for Full-Duplex Bidirectional-Channel Based Wireless Networks," in Proc. of IEEE INFOCOM 2013, Turin, Italy, 3120-3128, 2013. |
26 | L. Dong, Z. Han, A. Petropulu and H. Poor, "Improving Wireless Physical Layer Security via Cooperating Relays," IEEE Transactions on Signal Processing, vol.58, no.3, pp. 1875-1888, 2010. DOI |