204 research outputs found
An Extensive Game-Based Resource Allocation for Securing D2D Underlay Communications
Device-to-device (D2D) communication has been increasingly attractive due to its great potential to improve cellular communication performance. While resource allocation optimization for improving the spectrum efficiency is of interest in the D2D-related work, communication security, as a key issue in the system design, has not been well investigated yet. Recently, a few studies have shown that D2D users can actually serve as friendly jammers to help enhance the security of cellular user communication against eavesdropping attacks. However, only a few studies considered the security of D2D communications. In this paper, we consider the secure resource allocation problem, particularly, how to assign resources to cellular and the D2D users to maximize the system security. To solve this problem, we propose an extensive game-based algorithm aiming at strengthening the security of both cellular and the D2D communications via system resource allocation. Finally, the simulation results show that the proposed method is able to efficiently improve the overall system security when compared to existing studies
Secure Full-Duplex Device-to-Device Communication
This paper considers full-duplex (FD) device-to-device (D2D) communications
in a downlink MISO cellular system in the presence of multiple eavesdroppers.
The D2D pair communicate sharing the same frequency band allocated to the
cellular users (CUs). Since the D2D users share the same frequency as the CUs,
both the base station (BS) and D2D transmissions interfere each other. In
addition, due to limited processing capability, D2D users are susceptible to
external attacks. Our aim is to design optimal beamforming and power control
mechanism to guarantee secure communication while delivering the required
quality-of-service (QoS) for the D2D link. In order to improve security,
artificial noise (AN) is transmitted by the BS. We design robust beamforming
for secure message as well as the AN in the worst-case sense for minimizing
total transmit power with imperfect channel state information (CSI) of all
links available at the BS. The problem is strictly non-convex with infinitely
many constraints. By discovering the hidden convexity of the problem, we derive
a rank-one optimal solution for the power minimization problem.Comment: Accepted in IEEE GLOBECOM 2017, Singapore, 4-8 Dec. 201
Secure Full-Duplex Device-to-Device Communication
This paper considers full-duplex (FD) device-to-device (D2D) communications
in a downlink MISO cellular system in the presence of multiple eavesdroppers.
The D2D pair communicate sharing the same frequency band allocated to the
cellular users (CUs). Since the D2D users share the same frequency as the CUs,
both the base station (BS) and D2D transmissions interfere each other. In
addition, due to limited processing capability, D2D users are susceptible to
external attacks. Our aim is to design optimal beamforming and power control
mechanism to guarantee secure communication while delivering the required
quality-of-service (QoS) for the D2D link. In order to improve security,
artificial noise (AN) is transmitted by the BS. We design robust beamforming
for secure message as well as the AN in the worst-case sense for minimizing
total transmit power with imperfect channel state information (CSI) of all
links available at the BS. The problem is strictly non-convex with infinitely
many constraints. By discovering the hidden convexity of the problem, we derive
a rank-one optimal solution for the power minimization problem.Comment: Accepted in IEEE GLOBECOM 2017, Singapore, 4-8 Dec. 201
Physical layer security in 5G and beyond wireless networks enabling technologies
Information security has always been a critical concern for wireless communications due
to the broadcast nature of the open wireless medium. Commonly, security relies on cryptographic
encryption techniques at higher layers to ensure information security. However,
traditional cryptographic methods may be inadequate or inappropriate due to novel improvements
in the computational power of devices and optimization approaches. Therefore,
supplementary techniques are required to secure the transmission data. Physical layer
security (PLS) can improve the security of wireless communications by exploiting the characteristics
of wireless channels. Therefore, we study the PLS performance in the fifth generation
(5G) and beyond wireless networks enabling technologies in this thesis. The thesis
consists of three main parts.
In the first part, the PLS design and analysis for Device-to-Device (D2D) communication
is carried out for several scenarios. More specifically, in this part, we study the
underlay relay-aided D2D communications to improve the PLS of the cellular network. We
propose a cooperative scheme, whereby the D2D pair, in return for being allowed to share
the spectrum band of the cellular network, serves as a friendly jammer using full-duplex
(FD) and half-duplex (HD) transmissions and relay selection to degrade the wiretapped
signal at an eavesdropper. This part aims to show that spectrum sharing is advantageous
for both D2D communications and cellular networks concerning reliability and robustness
for the former and PLS enhancement for the latter. Closed-form expressions for the D2D
outage probability, the secrecy outage probability (SOP), and the probability of non-zero
secrecy capacity (PNSC) are derived to assess the proposed cooperative system model. The
results show enhancing the robustness and reliability of D2D communication while simultaneously
improving the cellular network’s PLS by generating jamming signals towards the
eavesdropper. Furthermore, intensive Monte-Carlo simulations and numerical results are
provided to verify the efficiency of the proposed schemes and validate the derived expressions’
accuracy.
In the second part, we consider a secure underlay cognitive radio (CR) network in the
presence of a primary passive eavesdropper. Herein, a secondary multi-antenna full-duplex
destination node acts as a jammer to the primary eavesdropper to improve the PLS of the
primary network. In return for this favor, the energy-constrained secondary source gets
access to the primary network to transmit its information so long as the interference to the
latter is below a certain level. As revealed in our analysis and simulation, the reliability and
robustness of the CR network are improved, while the security level of the primary network
is enhanced concurrently.
Finally, we investigate the PLS design and analysis of reconfigurable intelligent surface
(RIS)-aided wireless communication systems in an inband underlay D2D communication
and the CR network. An RIS is used to adjust its reflecting elements to enhance the data
transmission while improving the PLS concurrently. Furthermore, we investigate the design
of active elements in RIS to overcome the double-fading problem introduced in the RISaided
link in a wireless communications system. Towards this end, each active RIS element
amplifies the reflected incident signal rather than only reflecting it as done in passive RIS
modules. As revealed in our analysis and simulation, the use of active elements leads to a
drastic reduction in the size of RIS to achieve a given performance level. Furthermore, a
practical design for active RIS is proposed
Improving Physical Layer Security of Cellular Networks Using Full-Duplex Jamming Relay-Aided D2D Communications
This paper investigates the physical layer security and data transmission in cellular networks with inband underlay Device-to-Device (D2D) communications, where there is no direct link between D2D users. We propose to apply full-duplex (FD) transmission and dual antenna selection at the D2D relay node. The relay node can simultaneously act as a friendly jammer to improve the secrecy performance of the cellular network while enhancing the D2D communication data transmission. This is an appealing and practical scheme where spectrum sharing is beneficial for the D2D and cellular networks in terms of reliability enhancement and security provisioning, respectively. The practical scenario, where the eavesdropper is passive, is considered. The eavesdropper uses either selection combining or maximal ratio combining to combine the wiretapped signals of the cellular network. The secrecy performance of the cellular network is analyzed, and closed-form expressions for the secrecy outage probability and the probability of non-zero secrecy capacity are derived. We show that increasing the number of FD jamming antennas enhances the secrecy performance of the cellular network. A closed-form expression of the D2D outage probability is also provided. Simulation and numerical results are provided to verify the efficiency of the proposed scheme and to validate the accuracy of the derived expressions
- …