Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks

作者: Jianting Yue , Chuan Ma , Hui Yu , Wei Zhou

DOI: 10.1109/LCOMM.2013.092813.131367

关键词:

摘要: Device-to-device (D2D) communication is a promising technology for wireless in the near future. Since D2D usually reuses resource of cellular users, interference management key element. However, when secrecy capacity taken into consideration, caused by could be advantage as kind help against eavesdroppers. In this paper, we novelly introduce problem capacity, such that pair achieve its own transmission while requirement still satisfied. Moreover, utilize outage probability to better depict imperfect channel state information at eavesdropper. We also derive optimal power and propose access control mechanism.

参考文章(17)
Jianting Yue, Bo Yang, Xinping Guan, Fairness-guaranteed pricing and power allocation with a friendly jammer against eavesdropping international conference on wireless communications and signal processing. pp. 1- 6 ,(2012) , 10.1109/WCSP.2012.6542898
Chen Xu, Lingyang Song, Zhu Han, Dou Li, Bingli Jiao, Resource allocation using a reverse iterative combinatorial auction for device-to-device underlay cellular networks global communications conference. pp. 4542- 4547 ,(2012) , 10.1109/GLOCOM.2012.6503834
Jemin Lee, Hyundong Shin, Moe Z. Win, Secure node packing of large-scale wireless networks international conference on communications. pp. 815- 819 ,(2012) , 10.1109/ICC.2012.6364372
Peng Cheng, Lei Deng, Hui Yu, Youyun Xu, Hailong Wang, Resource allocation for cognitive networks with D2D communication: An evolutionary approach wireless communications and networking conference. pp. 2671- 2676 ,(2012) , 10.1109/WCNC.2012.6214252
Alberto Rabbachin, Andrea Conti, Moe Z. Win, The role of aggregate interference on intrinsic network secrecy international conference on communications. pp. 3548- 3553 ,(2012) , 10.1109/ICC.2012.6364388
Praveen Kumar Gopala, Lifeng Lai, Hesham El Gamal, On the Secrecy Capacity of Fading Channels IEEE Transactions on Information Theory. ,vol. 54, pp. 4687- 4698 ,(2008) , 10.1109/TIT.2008.928990
Tao Han, Rui Yin, Yanfang Xu, Guanding Yu, None, Uplink channel reusing selection optimization for Device-to-Device communication underlaying cellular networks personal, indoor and mobile radio communications. pp. 559- 564 ,(2012) , 10.1109/PIMRC.2012.6362848
Joao Barros, Miguel R. D. Rodrigues, Secrecy Capacity of Wireless Channels international symposium on information theory. pp. 356- 360 ,(2006) , 10.1109/ISIT.2006.261613
Xiangyun Zhou, Matthew R. McKay, Behrouz Maham, Are Hjorungnes, Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective IEEE Communications Letters. ,vol. 15, pp. 302- 304 ,(2011) , 10.1109/LCOMM.2011.011811.102433
Marcin Rodziewicz, Network coding aided Device-to-Device communication european wireless conference. pp. 1- 5 ,(2012)