Joint Power Allocation and Match Access for Physical Layer Security of Heterogeneous Network

  • Shiwei Yan School of Electrical Engineering and Computer Science, Peking University, Beijing, China
  • Yong Shang School of Electrical Engineering and Computer Science, Peking University, Beijing, China
  • Xiguang Zhang School of Electrical Engineering and Computer Science, Peking University, Beijing, China

Abstract

In this paper, we investigate the Physical Layer Security (PLS) of a multiple friendly jammers and multiple users wireless system in Device-to-Device (D2D) communications underlaying cellular networks with an eavesdropper. The aim is to maximize the increase of secrecy capacity of the entire system through optimal power allocation and jamming matching under various practical constraints. Firstly, the total increase secrecy capacity of D2D pairs with the help of jamming is derived, then we obtain optimal jamming power for each D2D pair and formulate the D2D pairs and jammers matching problem in the weighted bipartite graph via designing the Kuhn-Munkres (KM) algorithm. Finally, numerical results demonstrate that our scheme could greatly improve the secrecy performance of heterogeneous D2D and cellular networks.

Downloads

Download data is not yet available.

References

[1] L. J. Nandish P. Kuruvatti, Andreas Klein, “Robustness of location based d2d resource allocation against positioning errors,” in Vehicular Technology Conference (VTC Spring), Glasgow, United Kingdom, 2015, pp. 1–6.
[2] A. D. Wyner, “The wiretap channel,” Bell Syst. Techn. Journ., vol. 54, no. 8, pp. 1355–1387, 1975.
[3] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Transaction Wireless Communication., vol. 7, no. 6, pp. 2180–2189, Jun. 2008.
[4] S. K. Leung-Yan-Cheong and M. E. Hellman, “The gaussian wiretap channel,” IEEE Trans. Inf. Theory, vol. 24, pp. 451–456, Jul. 1978.
[5] H. Huang et al., “An optimal jammer selection for improving physical-layer security in wireless networks with multiple jammers,” in International Wireless Communications and Mobile Computing Conference, 2016, pp. 719–724.
[6] T. M. Hoang et al., “Physical layer security in cooperative energy harvesting networks with a friendly jammer,” IEEE Wireless Communications Letters, vol. 1, no. 1, p. 99, 2017.
[7] H. Y. Jianting Yue, Chuan Ma et al., “Secrecy-based access control for device-to-device communication underlaying cellular networks,” IEEE Communications Letters, vol. 17, no. 11, 2013.
[8] X. Z. D. L. X. L. Shiwei Yan, Yong Shang, “An artificial noise scheme for secure communication in heterogeneous d2d and cellular networks,” in Vehicular Technology Conference (VTC Fall), Montreal, Canada, 2016, pp. 1–5.
[9] S. Y. D. L. J. G. Xiguang Zhang, Yong Shang, “Adaptive power and access control for physical security of heterogeneous cellular network,” in Military Communications Conference, Milcom 2016 - IEEE, 2016, pp. 1202–1206.
[10] C. X. Zhang W, He W et al., “Power allocation for improving physical layer security in d2d communication via stackelberg game,” in International Conference on Wireless Communications & Signal Processing. IEEE, 2016.
[11] L. S. H. Zhang, T. Wang and Z. Han, “Radio resource allocation for physical-layer security in d2d underlay communications,” in Proc. IEEE ICC 2014, Sydney, Australia, Jun.
[12] L. H. A. Kschischang F R Frey B J, “Factor graphs and the sum- product algorithm,” IEEE TRANSACTIONS ON INFORMATION THEORY, pp. 498–519, 1998.
Published
2017-12-31
How to Cite
YAN, Shiwei; SHANG, Yong; ZHANG, Xiguang. Joint Power Allocation and Match Access for Physical Layer Security of Heterogeneous Network. Journal of Science and Technology: Issue on Information and Communications Technology, [S.l.], v. 3, n. 2, p. 11-15, dec. 2017. ISSN 1859-1531. Available at: <http://ict.jst.udn.vn/index.php/jst/article/view/58>. Date accessed: 26 apr. 2024. doi: https://doi.org/10.31130/jst.2017.58.