Joint Power Allocation and Match Access for Physical Layer Security of Heterogeneous Network
Abstract
In this paper, we investigate the Physical Layer Security (PLS) of a multiple friendly jammers and multiple users wireless system in Device-to-Device (D2D) communications underlaying cellular networks with an eavesdropper. The aim is to maximize the increase of secrecy capacity of the entire system through optimal power allocation and jamming matching under various practical constraints. Firstly, the total increase secrecy capacity of D2D pairs with the help of jamming is derived, then we obtain optimal jamming power for each D2D pair and formulate the D2D pairs and jammers matching problem in the weighted bipartite graph via designing the Kuhn-Munkres (KM) algorithm. Finally, numerical results demonstrate that our scheme could greatly improve the secrecy performance of heterogeneous D2D and cellular networks.
Downloads
References
[2] A. D. Wyner, “The wiretap channel,” Bell Syst. Techn. Journ., vol. 54, no. 8, pp. 1355–1387, 1975.
[3] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Transaction Wireless Communication., vol. 7, no. 6, pp. 2180–2189, Jun. 2008.
[4] S. K. Leung-Yan-Cheong and M. E. Hellman, “The gaussian wiretap channel,” IEEE Trans. Inf. Theory, vol. 24, pp. 451–456, Jul. 1978.
[5] H. Huang et al., “An optimal jammer selection for improving physical-layer security in wireless networks with multiple jammers,” in International Wireless Communications and Mobile Computing Conference, 2016, pp. 719–724.
[6] T. M. Hoang et al., “Physical layer security in cooperative energy harvesting networks with a friendly jammer,” IEEE Wireless Communications Letters, vol. 1, no. 1, p. 99, 2017.
[7] H. Y. Jianting Yue, Chuan Ma et al., “Secrecy-based access control for device-to-device communication underlaying cellular networks,” IEEE Communications Letters, vol. 17, no. 11, 2013.
[8] X. Z. D. L. X. L. Shiwei Yan, Yong Shang, “An artificial noise scheme for secure communication in heterogeneous d2d and cellular networks,” in Vehicular Technology Conference (VTC Fall), Montreal, Canada, 2016, pp. 1–5.
[9] S. Y. D. L. J. G. Xiguang Zhang, Yong Shang, “Adaptive power and access control for physical security of heterogeneous cellular network,” in Military Communications Conference, Milcom 2016 - IEEE, 2016, pp. 1202–1206.
[10] C. X. Zhang W, He W et al., “Power allocation for improving physical layer security in d2d communication via stackelberg game,” in International Conference on Wireless Communications & Signal Processing. IEEE, 2016.
[11] L. S. H. Zhang, T. Wang and Z. Han, “Radio resource allocation for physical-layer security in d2d underlay communications,” in Proc. IEEE ICC 2014, Sydney, Australia, Jun.
[12] L. H. A. Kschischang F R Frey B J, “Factor graphs and the sum- product algorithm,” IEEE TRANSACTIONS ON INFORMATION THEORY, pp. 498–519, 1998.