Browse > Article
http://dx.doi.org/10.3837/tiis.2019.10.006

Secure Transmission Scheme Based on the Artificial Noise in D2D-Enabled Full-Duplex Cellular Networks  

Chen, Yajun (China National Digital Switching System Engineering and Technological R&D Center)
Yi, Ming (China National Digital Switching System Engineering and Technological R&D Center)
Zhong, Zhou (China National Digital Switching System Engineering and Technological R&D Center)
Ma, Keming (China National Digital Switching System Engineering and Technological R&D Center)
Huang, Kaizhi (China National Digital Switching System Engineering and Technological R&D Center)
Ji, Xinsheng (China National Digital Switching System Engineering and Technological R&D Center)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.10, 2019 , pp. 4923-4939 More about this Journal
Abstract
In this paper, a secure transmission scheme based on the artificial noise is proposed for D2D communications underlaying the full-duplex cellular network, and a secure power allocation scheme to maximize the overall secrecy rate of both the cellular user and D2D transmitter node is presented. Firstly, the full-duplex base station transmits the artificial noise to guarantee the secure communications when it receives signals of cellular uplinks. Under this secure framework, it is found that improving the transmission power of the cellular user or the D2D transmitter node will degrade the secrecy rate of the other, although will improve itself secrecy rate obviously. Hence, a secure power allocation scheme to maximize the overall secrecy rate is presented subject to the security requirement of the cellular user. However, the original power optimization problem is non-convex. To efficiently solve it, we recast the original problem into a convex program problem by utilizing the proper relaxation and the successive convex approximation algorithm. Simulation results evaluate the effectiveness of the proposed scheme.
Keywords
D2D Communications; Artificial Noise; Secrecy Capacity; Successive Convex Approximation; Secure Power Allocation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Fodor G, Roger S, Rajatheva N, et al., "An Overview of Device-to-Device Communications Technology Components in METIS," IEEE Access, vol.4, pp. 3288-3299, 2016.   DOI
2 K. Doppler, M. Rinne, C. Wijting, et al., "Device to-device communication as an underlay to LTE-Advanced networks," IEEE Communication Magazine, vol.47, no.12, pp. 42-49, 2009.   DOI
3 G. Fodor, E. Dahlman, G. Mildh, et al., "Design aspects of network assisted device-to-device communications," IEEE Communication Magazine, vol.50, no.3, pp.170-77, 2012.   DOI
4 B. Li, Z. Fei, Z. Chu, Y. Zhang, "Secure Transmission for Heterogeneous Cellular Networks with Wireless Information and Power Transfer," IEEE Systems Journal, vol.12, no.4, pp. 3755-3766, 2018.   DOI
5 B. Li, Z. Fei, Z. Chu, et al., "Robust Chance-Constrained Secure Transmission for Cognitive Satellite-Terrestrial Networks," IEEE Transactions on Vehicular Technology, vol.67, no.5, pp.4208-4219, 2018.   DOI
6 B. Li, Z. Fei, X. Xu, et al., "Resource Allocations for Secure Cognitive Satellite Terrestrial Networks," IEEE Wireless Communications Letters, vol.7, no.1, pp.78-81, 2018.   DOI
7 B. Li, X. Qi, K. Huang, Z. Fei, F Zhou, R. Hu, "Security-Reliability Tradeoff Analysis for Cooperative NOMA in Cognitive Radio Networks," IEEE Transactions on Communications, vol.67, no.1, pp.83-96, 2019.   DOI
8 Y. Chen, X. Ji, K. Huang, et al., "Opportunistic access control for enhancing security in D2D-enabled cellular networks," SCIENCE CHINA Information Sciences, vol. 61, no. 4, 042304:1-12, April. 2018.
9 Z. Chu, F. Zhou, P. Xiao, Z. Zhu, et al., "Resource Allocation for Secure Wireless Powered Integrated Multicast and Unicast Services With Full Duplex Self-Energy Recycling," IEEE Transactions on Wireless Communications, vol. 18, no. 1, pp. 620-636, Jan. 2019.   DOI
10 M. Alam, Y. Du, J. Rodriguez, et al., "Secure Device-to-Device Communication in LTE-A," IEEE Communications Magazine, vol.52, no.4, pp. 66-73, 2014.   DOI
11 D. Zhu, A. Swindlehurst, S. Fakoorian, et al., "Device-to-device communications: the physical layer security advantage," in Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, 1606-1610, 2014.
12 H. Zhang, T. Wang, L. Song, et al., "Radio resource allocation for physical-layer security in D2D underlay communications," in Proc. of IEEE International Conference on Communications (ICC), Sydney, NSW, 2319-2324, 2014.
13 B. Day, A. Margetts, D. Bliss, and P. Schniter, "Full-duplex bidirectional MIMO: Achievable rates under limited dynamic range," IEEE Transactions on Signal Processing, vol.60, no.7, pp. 3702-3713, 2012.   DOI
14 J. Yue, C. Ma, Y. Hui, et al., "Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks," IEEE Communications Letters, vol.17, no.11, pp.2068-2071, 2013.   DOI
15 J. Yue, C. Ma, H. Yu, et al., "Secrecy-based Channel Assignment for Device-to-Device Communication: An Auction Approach," in Proc. of IEEE International Conference on Wireless Communications & Signal Processing (WCSP), Hangzhou, China, 1-6, 2013.
16 Y. Chen, X. Ji, K. Huang, et al., "Artificial noise-assisted physical layer security in D2D-enabled cellular networks," EURASIP Journal on Wireless Communications and Networking, 178, 2017.
17 W. Cheng, X. Zhang, and H. Zhang, "Optimal dynamic power control for full-duplex bidirectional-channel based wireless networks," in Proc. of IEEE 32nd INFOCOM, Turin, Italy, 3120-3128, 2013.
18 W. Afifi, M. Abdel-Rahman, M. Krunz, et al., "Full-Duplex or Half-Duplex: A Bayesian Game for Wireless Networks with Heterogeneous Self-Interference Cancellation Capabilities," IEEE Transactions on Mobile Computing, vol.17, no.5, pp.1076-1089, 2018.   DOI
19 V. Nguyen, H. Nguyen, O. Dobre, "A New Design Paradigm for Secure Full-Duplex Multiuser Systems," IEEE Journal on Selected Areas in Communications, vol.36, no.7, pp. 1480-1498, 2018.   DOI
20 X. Ji, X. Kang, K. Huang, et al., "The full-duplex artificial noise scheme for security of a cellular system," China Communications, vol.12, no. Supplement, pp. 150-156, 2015.
21 A. Beck, A. Ben-Tal, and L. Tetruashvili, "Application of the sequential parametric convex approximation method with application to nonconvex truss topology design problems," Journal of Global Optimizaiton, vol.47, no.1, pp. 29-51, 2010.   DOI
22 M. Li, Y. Guo, K. Huang, et al., "Secure power and subcarrier auction in uplink full-duplex cellular networks," China Communications, vol.12, Supplement, pp. 157-165, 2015.   DOI
23 G. Chen, Y. Gong, P. Xiao, et al., "Physical layer network security in the full-duplex relay system," IEEE Transactions on Information Forensics and Security, vol.10, no.3, pp. 574-583, 2015.   DOI
24 S. Goel, I. Negr, "Guaranteeing secrecy using artificial noise," IEEE Transactions on Wireless Communications, vol.7, no.6, pp. 2180-2189, 2008.   DOI
25 W. Cheng, X. Zhang, H. Zhang, "Optimal Dynamic Power Control for Full-Duplex Bidirectional-Channel Based Wireless Networks," in Proc. of IEEE INFOCOM 2013, Turin, Italy, 3120-3128, 2013.
26 L. Dong, Z. Han, A. Petropulu and H. Poor, "Improving Wireless Physical Layer Security via Cooperating Relays," IEEE Transactions on Signal Processing, vol.58, no.3, pp. 1875-1888, 2010.   DOI