Advertisement

Wireless Networks

, Volume 25, Issue 8, pp 4569–4584 | Cite as

Improving physical layer security and efficiency in D2D underlay communication

  • Weifeng LuEmail author
  • Xin Zheng
  • Jia Xu
  • Siguang Chen
  • Lijun Yang
Article

Abstract

Device-to-device (D2D) communication is a core technology for expanding the next generation wireless cellular network. To deal with the security challenges and optimize the system communication quality, this paper investigates the security and efficiency problem of D2D underlay communication in a base station cell area with the presence of malicious eavesdroppers. Fairness and strategy space of both D2D User Equipment and Cellular User Equipment are taken into consideration under the control of Efficiency Functions. The optimization problems are formulated as a game model series of utility functions built on the unit price of jamming power and the amount of jamming service. We extracting the system into a price bargain game with a buyer and a seller both desiring maximum profits, a bargaining game approach is adopted to solve this problem by reaching an agreement of unit price. The step number of bargain process is also a restriction under consideration. For the non-steps model, an Evaluation Function and a Comprehensive Utility Function are demonstrated to analyze the bargain process. For steps-contained model, the step number of iteration is involved and an attenuation function is introduced to modify the bargaining game. The algorithms of two models are proposed to derive the equilibrium point for reaching an agreement. Finally, extensive simulations are illustrated for verifying proposed theory.

Keywords

Physical layer security Bargaining game Price bargain Jamming power allocation Device-to-device communication 

Notes

Acknowledgements

Foundation Items The National Natural Science Foundation of China for Youth (61201160, 61602263); The Natural Science Foundation of Jiangsu Province (BK20131377, BK20151507, BK20160916); The Natural science fund for colleges and universities in Jiangsu Province under Grants (16KJB510034); The six talent peaks project in Jiangsu Province (XYDXXJS-044); A Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions (yx002001); The Jiangsu Overseas Research and Training Program for University Prominent Young and Middle-aged Teachers and Presidents; Sponsored by NUPTSF (Grant Nos. NY212012, NY214065,NY216020).

References

  1. 1.
    Gandotra, P., Jha, R. K., & Jain, S. (2017). A survey on device-to-device (D2D) communication: architecture and security issues. Journal of Network & Computer Applications, 78, 9–29.CrossRefGoogle Scholar
  2. 2.
    Chen, X., Hu, R. Q., & Jeon, J., et al. (2015). Optimal resource allocation and mode selection for D2D communication underlaying Cellular Networks. In IEEE global communications conference (pp. 1–6).Google Scholar
  3. 3.
    Zappone, A., Matthiesen, B., & Jorswieck, E. A. (2017). Energy efficiency in MIMO underlay and overlay device-to-device communications and cognitive radio systems. Mathematics, 65(4), 1026–1041.MathSciNetzbMATHGoogle Scholar
  4. 4.
    Yang, K., Martin, S., & Xing, C., et al. (2014). Energy-efficient power control for device-to-device communications. In IEEE international conference on communications workshops (pp. 483–488).Google Scholar
  5. 5.
    Huang, B. Y., Su, S. T., Wang, C. Y., Yeh, C. W., Wei, H. Y. (2016). Resource allocation in D2D communication-a game theoretic approach. IEEE Wireless Communications Letters, PP(99), 1–1.Google Scholar
  6. 6.
    Liu, J., Kato, N., Ujikawa, H., et al. (2016). Device-to-device communication for mobile multimedia in emerging 5G networks. ACM Transactions on Multimedia Computing Communications & Applications, 12(5s), 75.Google Scholar
  7. 7.
    Liu, Y., Chen, H. H., & Wang, L. (2017). Physical layer security for next generation wireless networks: theories, technologies, and challenges. IEEE Communications Surveys & Tutorials, 19(1), 347–376.CrossRefGoogle Scholar
  8. 8.
    Huss, M., Waqas, M., Ding, A. Y., et al. (2017). Security and privacy in device-to-device (D2D) communication: a review. IEEE Communications Surveys & Tutorials, 19(2), 1054–1079.CrossRefGoogle Scholar
  9. 9.
    Xu, J., Xiang, J., & Yang, D. (2015). Incentive mechanisms for time window dependent tasks in mobile crowdsensing. IEEE Transactions on Wireless Communications, 14(11), 6353–6364.CrossRefGoogle Scholar
  10. 10.
    Shannon, C. E. (1949). Communication theory of secrecy systems. Bell Labs Technical Journal, 28(4), 656–715.MathSciNetCrossRefGoogle Scholar
  11. 11.
    Xu, J., Xiang, J., & Li, Y. (2017). Incentivize maximum continuous time Interval coverage under budget constraint in mobile crowd sensing. Wireless Networks, 23(5), 1549–1562.CrossRefGoogle Scholar
  12. 12.
    Xu, J., Li, H., & Li, Y., et al. (2017). Incentivizing the biased requesters: Truthful task assignment mechanisms in crowdsourcing. In 2017 14th annual IEEE international conference on sensing, communication, and networking (pp. 1–9). IEEE.Google Scholar
  13. 13.
    Wyner, A. D. (1975). The wire-tap channel. Bell System Technical Journal, 54(8), 1355–1387.MathSciNetCrossRefGoogle Scholar
  14. 14.
    Leung-Yan-Cheong, S., & Hellman, M. E. (1978). The gaussian wire-tap channel. IEEE Transactions on Information Theory, 24(4), 451–456.MathSciNetCrossRefGoogle Scholar
  15. 15.
    Zhang, H., Yang, N., Long, K., Pan, M., Karagiannidis, G. K., & Leung, V. C. M. (2018). Secure communications in NOMA system: Subcarrier assignment and power allocation. IEEE Journal on Selected Areas in Communications.  https://doi.org/10.1109/JSAC.2018.2825559.CrossRefGoogle Scholar
  16. 16.
    Zhang, H., Xing, H., Cheng, J., Nallanathan, A., & Leung, V. (2016). Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming. IEEE Transactions on Industrial Informatics, 12(5), 1714–1725.CrossRefGoogle Scholar
  17. 17.
    Negi, R., Goel, S. (2005). Secret communication using artificial noise. In IEEE 62nd vehicular technology conference (pp. 1906–1910).Google Scholar
  18. 18.
    Kashyap, A., Basar, T., & Srikant, R. (2004). Correlated jamming on MIMO gaussian fading channels. IEEE Transactions on Information Theory, 50(9), 2119–2123.MathSciNetCrossRefGoogle Scholar
  19. 19.
    Zhang, H., Liu, N., Long, K., Cheng, J., Leung, V. C. M., & Hanzo, L. (2018). Energy efficient subchannel and power allocation for the software defined heterogeneous VLC and RF networks. IEEE Journal on Selected Areas in Communications.  https://doi.org/10.1109/JSAC.2018.2815478.CrossRefGoogle Scholar
  20. 20.
    Chen, S., Wang, K., Zhao, C., Zhang, H., & Sun, Y. (2017). Accelerated distributed optimization design for reconstruction of big sensory data. IEEE Internet of Things Journal, 4(5), 1716–1725.CrossRefGoogle Scholar
  21. 21.
    Han, Z., Marina, N., & Debbah, M., et al. (2009). Physical layer security came: How to date a girl with her boyfriend on the same table. In International conference on game theory for networks: IEEE (pp. 287–294).Google Scholar
  22. 22.
    Yang, H., Xie, X., & Vasilakos, A. V. (2016). A robust Stackelberg game based uplink power control for device-to-device communication with channel uncertainty and outage probability constraints. Wireless Personal Communications, 90(2), 551–573.CrossRefGoogle Scholar
  23. 23.
    Kebriaei, H., Maham, B., & Niyato, D. (2016). Double sided bandwidth-auction game for cognitive device-to-device communication in cellular networks. IEEE Transactions on Vehicular Technology, 65(9), 7476–7487.CrossRefGoogle Scholar
  24. 24.
    Lin, Y. D., & Hsu, Y. C. (2000). Multihop cellular: A new architecture for wireless communications. In Nineteenth joint conference of the IEEE computer and communications societies proceedings (pp. 1273–1282).Google Scholar
  25. 25.
    Asadi, A., Wang, Q., & Mancuso, V. (2014). A survey on device-to-device communication in cellular networks. IEEE Communications Surveys & Tutorials, 16(4), 1801–1819.CrossRefGoogle Scholar
  26. 26.
    Tehrani, M. N., Uysal, M., & Yanikomeroglu, H. (2014). Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Communications Magazine, 52(5), 86–92.CrossRefGoogle Scholar
  27. 27.
    Feng, D., et al. (2016). Device-to-device communications in cellular networks. IEEE Communications Magazine, 52(4), 49–55.CrossRefGoogle Scholar
  28. 28.
    Wen, S., et al. (2013). Distributed resource management for device-to-device (D2D) communication underlay cellular networks. In IEEE international Symposium on personal indoor and mobile radio communications (pp. 1624–1628).Google Scholar
  29. 29.
    Wang, Mingjun, & Yan, Z. (2017). A survey on security in D2D communications. Mobile Networks & Applications, 22(2), 195–208.CrossRefGoogle Scholar
  30. 30.
    Jung, M., Hwang, K., & Choi, S. (2012). Joint mode selection and power allocation scheme for power-efficient device-to-device (D2D) communication. In IEEE vehicular technology conference (pp. 1–5).Google Scholar
  31. 31.
    Zhou, Z., et al. (2014). Energy efficiency and spectral efficiency tradeoff in device-to-device (D2D) communications. IEEE Wireless Communications Letters, 3(5), 485–488.CrossRefGoogle Scholar
  32. 32.
    Ghavimi, Fayezeh, & Chen, Hsiao-Hwa. (2015). M2M communications in 3GPP LTE/LTE-A networks: Architectures, service requirements, challenges, and applications. IEEE Communications Surveys & Tutorials, 17(2), 525–549.CrossRefGoogle Scholar
  33. 33.
    Huang, Hong, Ahmed, N., & Karthik, P. (2011). On a new type of denial of service attack in wireless networks: the distributed jammer network. IEEE Transactions on Wireless Communications, 10(7), 2316–2324.CrossRefGoogle Scholar
  34. 34.
    Mascetti, S., Bertolaja, L., & Bettini, C. (2013). A practical location privacy attack in proximity services. In IEEE international conference on mobile data management (pp. 87–96).Google Scholar
  35. 35.
    Shirvanian, M., & Saxena, N. (2014). Wiretapping via mimicry: Short voice imitation man-in-the-middle attacks on crypto phones. In ACM Sigsac conference on computer and communications security (pp. 868–879).Google Scholar
  36. 36.
    Gandotra, P., Jha, R. K., & Jain, S. (2017). A survey on device-to-device (D2D) communication: Architecture and security issues. Journal of Network & Computer Applications, 78(C), 9–29.CrossRefGoogle Scholar
  37. 37.
    Sudarsono, A., & Nakanishi, T. (2014). An implementation of secure data exchange in wireless delay tolerant network using attribute-based encryption. In Second international Symposium on computing and networking (pp. 536–542). IEEE Computer Society.Google Scholar
  38. 38.
    Shen, W., et al. (2014). Secure key establishment for device-to-device communications. In IEEE global communications conference (pp. 336–340).Google Scholar
  39. 39.
    Tata, C., & Kadoch, M. (2014). Secure multipath routing algorithm for device-to-device communications for public safety over LTE heterogeneous networks. In International conference on information & communication technologies for disaster management (pp. 1–7).Google Scholar
  40. 40.
    Zhang, H., et al. (2014). Radio resource allocation for physical-layer security in D2D underlay communications. In 2014 IEEE international conference on communications (pp. 2319–2324).Google Scholar
  41. 41.
    Zheng, C., et al. (2015). Robust secrecy rate optimizations for multiuser multiple-input-single-output channel with device-to-device communications. IET Communications, 9(3), 396–403.CrossRefGoogle Scholar
  42. 42.
    Chen, S., Zhao, C., Wu, M., Sun, Z., Zhang, H., & Leung, V. C. M. (2016). Compressive network coding for wireless sensor networks: spatio-temporal coding and optimization design. Computer Networks, 108, 345–356.CrossRefGoogle Scholar
  43. 43.
    Chen, S., Wu, M., Wang, K., & Sun, Z. (2014). Compressive network coding for error control in wireless sensor networks. Wireless Networks, 20(8), 2605–2615.CrossRefGoogle Scholar
  44. 44.
    Luo, Y., et al. (2015). Power control and channel access for physical-layer security of D2D underlay communication. In IEEE international conference on wireless communications & signal processing (pp. 1–5).Google Scholar
  45. 45.
    Wang, B., Wu, Y., & Liu, K. J. R. (2010). Game theory for cognitive radio networks: An overview. Computer Networks, 54(14), 2537–2561.CrossRefGoogle Scholar
  46. 46.
    Pei, Yiyang, & Liang, Ying-Chang. (2013). Resource allocation for device-to-device communications overlaying two-way cellular networks. IEEE Transactions on Wireless Communications, 12(7), 3611–3621.CrossRefGoogle Scholar
  47. 47.
    Chen, Xu, Song, Lingyang, Han, Zhu, Zhao, Qun, Wang, Xiaoli, Cheng, Xiang, et al. (2013). Efficiency resource allocation for device-to-device underlay communication systems: a reverse iterative combinatorial auction based approach. IEEE Journal on Selected Areas in Communications, 31(9), 348–358.CrossRefGoogle Scholar
  48. 48.
    Zhang, R., Song, L., Han, Z., Cheng, X., & Jiao, B. (2013). Distributed resource allocation for device-to-device communications underlaying cellular networks. In IEEE international conference on communications (ICC) (pp. 1889–1893).Google Scholar
  49. 49.
    Kapetanovic, D., Zheng, G., & Rusek, F. (2015). Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks. IEEE Communications Magazine, 53(6), 21–27.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Computer ScienceNanjing University of Posts and TelecommunicationsNanjingChina
  2. 2.College of IoTNanjing University of Posts and TelecommunicationsNanjingChina
  3. 3.Jiangsu Key Laboratory of Big Data Security and Intelligent ProcessingNanjingChina

Personalised recommendations