318 research outputs found

    Secure Full-Duplex Device-to-Device Communication

    Get PDF
    This paper considers full-duplex (FD) device-to-device (D2D) communications in a downlink MISO cellular system in the presence of multiple eavesdroppers. The D2D pair communicate sharing the same frequency band allocated to the cellular users (CUs). Since the D2D users share the same frequency as the CUs, both the base station (BS) and D2D transmissions interfere each other. In addition, due to limited processing capability, D2D users are susceptible to external attacks. Our aim is to design optimal beamforming and power control mechanism to guarantee secure communication while delivering the required quality-of-service (QoS) for the D2D link. In order to improve security, artificial noise (AN) is transmitted by the BS. We design robust beamforming for secure message as well as the AN in the worst-case sense for minimizing total transmit power with imperfect channel state information (CSI) of all links available at the BS. The problem is strictly non-convex with infinitely many constraints. By discovering the hidden convexity of the problem, we derive a rank-one optimal solution for the power minimization problem.Comment: Accepted in IEEE GLOBECOM 2017, Singapore, 4-8 Dec. 201

    Secure Full-Duplex Device-to-Device Communication

    Get PDF
    This paper considers full-duplex (FD) device-to-device (D2D) communications in a downlink MISO cellular system in the presence of multiple eavesdroppers. The D2D pair communicate sharing the same frequency band allocated to the cellular users (CUs). Since the D2D users share the same frequency as the CUs, both the base station (BS) and D2D transmissions interfere each other. In addition, due to limited processing capability, D2D users are susceptible to external attacks. Our aim is to design optimal beamforming and power control mechanism to guarantee secure communication while delivering the required quality-of-service (QoS) for the D2D link. In order to improve security, artificial noise (AN) is transmitted by the BS. We design robust beamforming for secure message as well as the AN in the worst-case sense for minimizing total transmit power with imperfect channel state information (CSI) of all links available at the BS. The problem is strictly non-convex with infinitely many constraints. By discovering the hidden convexity of the problem, we derive a rank-one optimal solution for the power minimization problem.Comment: Accepted in IEEE GLOBECOM 2017, Singapore, 4-8 Dec. 201

    Wireless powered D2D communications underlying cellular networks: design and performance of the extended coverage

    Get PDF
    Because of the short battery life of user equipments (UEs), and the requirements for better quality of service have been more demanding, energy efficiency (EE) has emerged to be important in device-to-device (D2D) communications. In this paper, we consider a scenario, in which D2D UEs in a half-duplex decode-and-forward cognitive D2D communication underlying a traditional cellular network harvest energy and communicate with each other by using the spectrum allocated by the base station (BS). In order to develop a practical design, we achieve the optimal time switching (TS) ratio for energy harvesting. Besides that, we derive closed-form expressions for outage probability, sum-bit error rate, average EE and instantaneous rate by considering the scenario when installing the BS near UEs or far from the UEs. Two communication types are enabled by TS-based protocol. Our numerical and simulation results prove that the data rate of the D2D communication can be significantly enhanced.Web of Science58439939

    Security for 5G Mobile Wireless Networks

    Get PDF
    The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks. The paper starts with a review on 5G wireless networks particularities as well as on the new requirements and motivations of 5G wireless security. The potential attacks and security services with the consideration of new service requirements and new use cases in 5G wireless networks are then summarized. The recent development and the existing schemes for the 5G wireless security are presented based on the corresponding security services including authentication, availability, data confidentiality, key management and privacy. The paper further discusses the new security features involving different technologies applied to 5G such as heterogeneous networks, device-to-device communications, massive multiple-input multiple-output, software defined networks and Internet of Things. Motivated by these security research and development activities, we propose a new 5G wireless security architecture, based on which the analysis of identity management and flexible authentication is provided. As a case study, we explore a handover procedure as well as a signaling load scheme to show the advantage of the proposed security architecture. The challenges and future directions of 5G wireless security are finally summarized

    Resource Allocation for Device-to-Device Communications in Multi-Cell Multi-Band Heterogeneous Cellular Networks

    Full text link
    Heterogeneous cellular networks (HCNs) with millimeter wave (mm-wave) communications are considered as a promising technology for the fifth generation mobile networks. Mm-wave has the potential to provide multiple gigabit data rate due to the broad spectrum. Unfortunately, additional free space path loss is also caused by the high carrier frequency. On the other hand, mm-wave signals are sensitive to obstacles and more vulnerable to blocking effects. To address this issue, highly directional narrow beams are utilized in mm-wave networks. Additionally, device-to-device (D2D) users make full use of their proximity and share uplink spectrum resources in HCNs to increase the spectrum efficiency and network capacity. Towards the caused complex interferences, the combination of D2D-enabled HCNs with small cells densely deployed and mm-wave communications poses a big challenge to the resource allocation problems. In this paper, we formulate the optimization problem of D2D communication spectrum resource allocation among multiple micro-wave bands and multiple mm-wave bands in HCNs. Then, considering the totally different propagation conditions on the two bands, a heuristic algorithm is proposed to maximize the system transmission rate and approximate the solutions with sufficient accuracies. Compared with other practical schemes, we carry out extensive simulations with different system parameters, and demonstrate the superior performance of the proposed scheme. In addition, the optimality and complexity are simulated to further verify effectiveness and efficiency.Comment: 13 pages, 11 figures, IEEE Transactions on Vehicular Technolog

    Resource Allocation for Device-to-Device Communications Underlaying Heterogeneous Cellular Networks Using Coalitional Games

    Full text link
    Heterogeneous cellular networks (HCNs) with millimeter wave (mmWave) communications included are emerging as a promising candidate for the fifth generation mobile network. With highly directional antenna arrays, mmWave links are able to provide several-Gbps transmission rate. However, mmWave links are easily blocked without line of sight. On the other hand, D2D communications have been proposed to support many content based applications, and need to share resources with users in HCNs to improve spectral reuse and enhance system capacity. Consequently, an efficient resource allocation scheme for D2D pairs among both mmWave and the cellular carrier band is needed. In this paper, we first formulate the problem of the resource allocation among mmWave and the cellular band for multiple D2D pairs from the view point of game theory. Then, with the characteristics of cellular and mmWave communications considered, we propose a coalition formation game to maximize the system sum rate in statistical average sense. We also theoretically prove that our proposed game converges to a Nash-stable equilibrium and further reaches the near-optimal solution with fast convergence rate. Through extensive simulations under various system parameters, we demonstrate the superior performance of our scheme in terms of the system sum rate compared with several other practical schemes.Comment: 13 pages, 12 figure

    Energy-Efficient NOMA Enabled Heterogeneous Cloud Radio Access Networks

    Get PDF
    Heterogeneous cloud radio access networks (H-CRANs) are envisioned to be promising in the fifth generation (5G) wireless networks. H-CRANs enable users to enjoy diverse services with high energy efficiency, high spectral efficiency, and low-cost operation, which are achieved by using cloud computing and virtualization techniques. However, H-CRANs face many technical challenges due to massive user connectivity, increasingly severe spectrum scarcity and energy-constrained devices. These challenges may significantly decrease the quality of service of users if not properly tackled. Non-orthogonal multiple access (NOMA) schemes exploit non-orthogonal resources to provide services for multiple users and are receiving increasing attention for their potential of improving spectral and energy efficiency in 5G networks. In this article a framework for energy-efficient NOMA H-CRANs is presented. The enabling technologies for NOMA H-CRANs are surveyed. Challenges to implement these technologies and open issues are discussed. This article also presents the performance evaluation on energy efficiency of H-CRANs with NOMA.Comment: This work has been accepted by IEEE Network. Pages 18, Figure
    corecore