Browse > Article
http://dx.doi.org/10.6109/jkiice.2017.21.6.1100

Device-to-Device Communication Power Control Technique for Ensuring Communication Security of Cellular System  

Lee, Kisong (Department of Information and Telecommunication Engineering, Kunsan National University)
Hong, Jun-Pyo (Department of Information and Communications Engineering, Pukyong National University)
Abstract
In this paper, we propose a power control technique for D2D communication in the heterogenous network consisting of cellular and D2D communication systems. Although the transmit signal of D2D communication degrades the performance of cellular system by interfering the signal reception at CU in the conventional heterogenous networks without eavesdroppers, it can be utilized as jamming signal for preventing other devices from recovering the transmitted information if there are eavesdroppers in the network. The proposed power control technique maximizes the achievable rate of D2D communication while ensuring the target security performance of cellular communication system. Through simulation results, we validate the analysis results and compare the performance with the conventional D2D communication scheme that utilizes its full transmit power for maximizing the achievable rate regardless of the performance of cellular system.
Keywords
D2D communication; Heterogeneous network; Secrecy rate; Outage probability; Internet-of-Things;
Citations & Related Records
연도 인용수 순위
  • Reference
1 X. Teng, J. B. Wendt, and M. Potkonjak, "Security of IoT systems: Design challenges and opportunities," in Proc. IEEE/ACM International Conference on Computer-Aided Design, Nov. 2014, pp. 417-423.
2 M. Centenaro, L. Vangelista, A. Zanella, and M. Zorzi, "Long-range communications in unlicensed bands: the rising stars in the IoT and smart city scenarios," IEEE Wireless Communications, vol. 23, no. 5, pp. 60-67, Oct. 2016.   DOI
3 S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wiretap channel," IEEE Transactiona on Information Theory, vol. 24, pp. 451-456, July 1978.   DOI
4 G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Transactions on Signal Processing, vol. 59, no. 3, pp. 1317-1322, Mar. 2011.   DOI
5 K.-H. Park, T. Wang, and M.-S. Alouini, "On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming," IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1741-1750, Sep. 2013.   DOI
6 H. Hui, A. L. Swindlehurst, G. Li, and J. Liang, "Secure relay and jammer selection for physical layer security," IEEE Signal Processing Letters, vol. 22, no. 8, pp. 1147-1151, Aug. 2015.   DOI
7 Y. Wang, Z. Chen, Y. Yao, M. Shen, and B. Xia, "Secure communications of cellular users in Device-to-device communication underlaying cellular networks," in 2014 Sixth International Conference on Wireless Communications and Signal Processing. (WCSP), 2014.