SCIENCE CHINA Information Sciences, Volume 61, Issue 4: 042304(2018) https://doi.org/10.1007/s11432-017-9160-y

## Opportunistic access control for enhancing security in D2D-enabled cellular networks

• AcceptedJun 26, 2017
• PublishedOct 11, 2017
Share
Rating

### Abstract

In this paper, we investigate secure communication over cellular uplinks in device-to-device (D2D)-enabled cellular networks. We consider a more general scenario, in which multiple D2D pairs could simultaneously share the same resource block with a specific cellular user. First, an opportunistic access control scheme based on wireless channel gains is proposed, by which the candidate selected set of D2D pairs sharing the same resource block is determined. The proposed scheme could guarantee reliable communications for both cellular users and D2D pairs, and further could combat eavesdroppers while keeping the legitimate cellular user as non-intrusive as possible, regarding D2D pairs as friendly jammers in a non-collaborative way. Then, we derive theoretical results to characterize the security and reliability of the typical cellular and D2D links, respectively. To further support the performance of this hybrid network, we next present an interference threshold optimization model. Our aim is to minimize the connection outage probability (COP) of D2D pairs subject to the secrecy requirement of the cellular user. Finally, simulation results are presented to validate the effectiveness of our proposed scheme.

### Acknowledgment

This work was supported in part by National High Technology Research and Development Program of China (863) (Grant No. SS2015AA011306), Open Research Fund of National Mobile Communications Research Laboratory, Southeast University (Grant No. 2013D09) and National Natural Science Foundation of China (Grant Nos. 61379006, 61521003, 61401510).

### References

[1] Agiwal M, Roy A, Saxena N. Next Generation 5G Wireless Networks: A Comprehensive Survey. IEEE Commun Surv Tutorials, 2016, 18: 1617-1655 CrossRef Google Scholar

[2] Asadi A, Wang Q, Mancuso V. A Survey on Device-to-Device Communication in Cellular Networks. IEEE Commun Surv Tutorials, 2014, 16: 1801-1819 CrossRef Google Scholar

[3] Phunchongharn P, Hossain E, Kim D I. Resource allocation for device-to-device communications underlaying LTE-advanced networks. IEEE Wirel Commun, 2013, 20: 91--100. Google Scholar

[4] Ding G, Wang J, Wu Q. Cellular-Base-Station-Assisted Device-to-Device Communications in TV White Space. IEEE J Sel Areas Commun, 2016, 34: 107-121 CrossRef Google Scholar

[5] Yu G, Xu L, Feng D. Joint Mode Selection and Resource Allocation for Device-to-Device Communications. IEEE Trans Commun, 2014, 62: 3814-3824 CrossRef Google Scholar

[6] Li B, Fei Z, Chen H. Robust Artificial Noise-Aided Secure Beamforming in Wireless-Powered Non-Regenerative Relay Networks. IEEE Access, 2016, 4: 7921-7929 CrossRef Google Scholar

[7] Li B, Fei Z S. Robust beamforming and cooperative jamming for secure transmission in DF relay systems. EURASIP J Wirel Commun, 2016, 1: 1--11. Google Scholar

[8] Zhang L J, Jin L, Luo W Y, et al. Robust secure transmission for multiuser MISO systems with probabilistic QoS constraints. Sci China Inf Sci, 2016, 59: 022309. Google Scholar

[9] Khisti A, Wornell G W. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel. IEEE Trans Inform Theor, 2010, 56: 3088-3104 CrossRef Google Scholar

[10] Bloch M, Barros J, Rodrigues M R D, et al. Wireless information theoretic security. IEEE Trans Inf Theory, 2011, 54: 2515--2534. Google Scholar

[11] Li B, Fei Z, Chu Z. Secure Transmission for Heterogeneous Cellular Networks with Wireless Information and Power Transfer. IEEE Syst J, 2017, : 1-12 CrossRef Google Scholar

[12] Xiong J, Cheng L, Ma D. Destination-Aided Cooperative Jamming for Dual-Hop Amplify-and-Forward MIMO Untrusted Relay Systems. IEEE Trans Veh Technol, 2016, 65: 7274-7284 CrossRef Google Scholar

[13] Cheng L, Li W, Ma D. Moving window scheme for extracting secret keys in stationary environments. IET Commun, 2016, 10: 2206-2214 CrossRef Google Scholar

[14] Ji X S, Yang Y, Huang K Z, et al. Physical layer authentication scheme based on hash method. J Electron Inf Technol, 2016, 38: 2900--2907. Google Scholar

[15] Alam M, Yang D, Rodriguez J, et al. Secure device-to-device communication in LTE-A. IEEE Commun Mag, 2014, 52: 66--73. Google Scholar

[16] Zhu D H, Swindlehurst A L, Fakoorian S A A, et al. Device-to-device communications: the physical layer security advantage. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, 2014. 1606--1610. Google Scholar

[17] Kang X L, Ji X S, Huang K Z. Secure D2D underlaying cellular communication based on artificial noise assisted. J Commun, 2015, 36: 149--156. Google Scholar

[18] Kang X L, Ji X S, Huang K Z, et al. Secure D2D communication underlaying cellular networks: artificial noise assisted. In: Proceedings of IEEE International Conference on Vehicular Technology (VTC), Montreal, 2016. Google Scholar

[19] Chen Y J, Ji X S, Huang K Z, et al. Secrecy-outage-probability-based access strategy for device-to-device communications underlaying cellular networks. J Commun, 2016, 37: 86--94. Google Scholar

[20] Yue J T, Ma C, Yu H, et al. Secrecy-based channel assignment for device-to-device communication: an auction approach. In: Proceedings of IEEE International Conference on Wireless Communications and Signal Processing (WCSP), Hangzhou, 2013. 1--6. Google Scholar

[21] Cumanan K, Chu Z, Ding Z. Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with device-to-device communications. IET Commun, 2015, 9: 396-403 CrossRef Google Scholar

[22] Zhang H, Wang T Y, Song L Y, et al. Radio resource allocation for physical-layer security in D2D underlay communications. In: Proceedings of IEEE International Conference on Communications (ICC), Sydney, 2014. 2319--2324. Google Scholar

[23] Sun L, Du Q, Ren P. Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation. IEEE Trans Veh Technol, 2016, 65: 8767-8774 CrossRef Google Scholar

[24] Li W, Wu H Q, Song M, et al. Secrecy-oriented resource sharing for cellular device-to-device underlay. In: Proceedings of IEEE International Conference on Global Communications Conference (GLOBECOM), San Diego, 2015. 1--5. Google Scholar

[25] Zhang R, Cheng X, Yang L. Cooperation via Spectrum Sharing for Physical Layer Security in Device-to-Device Communications Underlaying Cellular Networks. IEEE Trans Wireless Commun, 2016, 15: 5651-5663 CrossRef Google Scholar

[26] Ma C, Liu J Q, Tian X H, et al. Interference exploitation in D2D-enabled cellular networks: a secrecy perspective. IEEE Trans Commun, 2015, 63: 229--242. Google Scholar

[27] Xu X, He B, Yang W. Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers. IEEE TransInformForensic Secur, 2016, 11: 373-387 CrossRef Google Scholar

[28] Wang C, Wang H M, Xia X G. Uncoordinated Jammer Selection for Securing SIMOME Wiretap Channels: A Stochastic Geometry Approach. IEEE Trans Wireless Commun, 2015, 14: 2596-2612 CrossRef Google Scholar

[29] Stoyan D, Kendall W S, Mecke J. Stochastic Geometry and Its Applications. 2nd ed. Hoboken: Wiley, 1996. Google Scholar

[30] Wang C, Wang H M. Opportunistic jamming for enhancing security: stochastic geometry modeling and analysis. IEEE Trans Veh Tech, 2016, 14: 2596--2612. Google Scholar

[31] Wang H, Zhou X, Reed M C. Physical Layer Security in Cellular Networks: A Stochastic Geometry Approach. IEEE Trans Wireless Commun, 2013, 12: 2776-2787 CrossRef Google Scholar

[32] Haenggi M, Ganti R K. Interference in Large Wireless Networks. FNT Networking, 2008, 3: 127-248 CrossRef Google Scholar

[33] Haenggi M. On Distances in Uniformly Random Networks. IEEE Trans Inform Theor, 2005, 51: 3584-3586 CrossRef Google Scholar

• Figure 1

(Color online) System model.

• Figure 2

(Color online) Opportunistic access control scheme based on wireless channel gains.

• Figure 3

(Color online) CU SOP of the opportunistic access control scheme versus ${\beta~_e}$.

• Figure 4

(Color online) D2D COP of the opportunistic access control scheme versus ${\beta~_d}$.

• Figure 5

(Color online) Performance versus different interference thresholds. (a) CU SOP; (b) D2D COP.

• Figure 8

(Color online) D2D COP versus ${\beta~_d}$ under different threshold $\epsilon$.

•

Algorithm 1 Search algorithm for obtaining optimal values $\delta~_1^*$, $\delta~_2^*$

Input: $\kappa$, $\lambda_c$, $\lambda_d$, $\lambda_e$, $P_C$, $P_D$, $\beta_e$, $\beta_d$, $\delta^{\rm~up}_1$, $\delta^{\rm~up}_2$, $\epsilon$, $\Delta~{\delta~_1}$, $\Delta~{\delta~_2}$;

Output: $\delta~_1^*$, $\delta~_2^*$;

Initialization: $M{\rm{~=~}}\frac{{\delta~_1^{\rm~up}}}{{\Delta~{\delta~_1}}}$, $~N{\rm{~=~}}\frac{{\delta~_2^{\rm~up}}}{{\Delta~{\delta~_2}}}$, and set $P_d^{\rm~temp}~=1$;

for $~m=1:M~$

for $~n=1:N~$

Calculate $P_c^{\rm~sop}(~{m,n}~)$ in (11);

if $P_c^{\rm~sop}(~{m,n}~)~\le~\varepsilon$ then

Update the set $(~{{{\tilde\delta~}_1},{{\tilde\delta~}_2}})$ by putting $\Delta~{\delta~_1}*m$, $\Delta~{\delta~_2}*n$ into the set $(~{{{\tilde\delta~}_1},{{\tilde\delta~}_2}})$;

end if

end for

end for

Set $L$ as the number of entries in the determined set ${{\tilde\delta~}_1}$ and ${{\tilde\delta~}_2}$. That is, $L=~{\rm~Card}(~{{\tilde\delta~}_1})={\rm~Card}(~{{\tilde\delta~}_2}~)$.

for $~l=1:L~$

Calculate $P_d^{\rm~cop}$ by substituting the entries $\delta~_{1l}$, $\delta~_{2l}$ into (15) that lie in the determined set $(~{{{\tilde\delta~}_1},{{\tilde\delta~}_2}})$;

if $P_d^{\rm~cop}~<~P_d^{\rm~temp}$ then

$P_d^{\rm~temp}~=~P_d^{\rm~cop}$;

Update $\delta~_1^*$, $\delta~_2^*$ by $\delta~_1^*=\delta~_{1l}$, $\delta~_2^*=\delta~_{2l}$;

end if

end for

Return $\delta~_1^*$, $\delta~_2^*$; (The optimal values are obtained.)

Citations

• #### 0

Altmetric

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有