Jamming partner selection for maximising the worst D2D secrecy rate based on social trust

نویسندگان

  • Li Wang
  • Huaqing Wu
چکیده

Device-to-device (D2D) communications have recently attracted broad attention, owing to its potential ability to improve spectrum and energy efficiency within the existing cellular infrastructure. Without sophisticated control, D2D users themselves are not powerful enough to resist eavesdropping or fight against security attacks. This work investigates how to select jamming partners for D2D users to thwart eavesdroppers by exploiting social relationship with the help of full channel state information (CSI) and partial CSI, respectively. We aim to maximise the worst-case eavesdropping by selecting jammer node and allocating transmit power for both source and jammer nodes. We first present a heuristic genetic algorithm-based solution to address the problem. We then propose low-complexity optimisation solutions by considering the upper and lower bounds of power allocation. Numerical results show that the proposed schemes can achieve better performance through finding an appropriate partner. Copyright © 2015 John Wiley & Sons, Ltd. *Correspondence Li Wang, School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China. E-mail: [email protected] Received 23 June 2015; Revised 13 September 2015; Accepted 22 September 2015

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer

Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...

متن کامل

Relay and jammer selection schemes for improving physical layer security in two-way cooperative networks

This paper is concerned with the relay and jammers selection in two-way cooperative networks to improve their physical layer security. Three different categories of selection schemes are proposed which are; selection schemes without jamming, selection schemes with conventional jamming and selection schemes with controlled jamming. The selection process is analyzed for two different network mode...

متن کامل

Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective

This paper investigates from the physical layer security (PLS) perspective the fundamental issues of mode selection and spectrum partition in cellular networks with inband device-to-device (D2D) communication. We consider a mode selection scheme allowing each D2D pair to probabilistically switch between the underlay and overlay modes, and also a spectrum partition scheme where the system spectr...

متن کامل

Study of Relay Selection for Physical-Layer Security in Buffer-Aided Relay Networks Based on the Secrecy Rate Criterion

In this paper, we investigate an opportunistic relay and jammer scheme along with relay selection algorithms based on the secrecy rate criterion in multiple-input multiple-output buffer-aided down link relay networks, which consist of one source, a number of relay nodes, legitimate users and eavesdroppers, with the constraints of physical layer security. The opportunistic relay and jammer schem...

متن کامل

Robust MIMO Harvest-and-Jam Helpers and Relaying for Secret Communications

Cooperative jamming has been demonstrated to be an effective means to provide secret wireless communications and yet this is realized at the expense of the power consumption of the friendly jammers. This paper considers the scenario where friendly jammers harvest energy wirelessly from the signal transmitted by the source, and then use only the harvested energy to transmit the jamming signals f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Trans. Emerging Telecommunications Technologies

دوره 28  شماره 

صفحات  -

تاریخ انتشار 2017