Skip to main content

Joint D2D Cooperative Relaying and Friendly Jamming Selection for Physical Layer Security

  • Conference paper
  • First Online:

Abstract

D2D communications are emerging technologies to improve spectrum efficiency, energy efficiency as well as physical layer security of cellular networks. In most research, D2D users, considered as friendly jammers, can improve the information security of cellular networks. D2D users can also work as cooperative relays between the eNB and the cellular user (CU) to increase the transmission rate and improve the security capacity simultaneously. Considering there exists an active eavesdropper in the cellular network, which can attack as a passive eavesdropper or an active jammer, joint D2D cooperative relaying and friendly jamming selection can enhance the secrecy achievable rate or the transmission rate of CU. We formulate a Stackelberg game between different intelligent agents, and derive the mixed-strategy equilibrium (MSE) via a hierarchical learning algorithm based on Q-learning. Simulation results show that the strategic selections of D2D users and the active eavesdropper are convergent, and the proposed algorithm has a better performance than the random selection method.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Federico, B., Robert, W.H., Angel, L., Thomas, L.M., Petar, P.: Five disruptive technology directions for 5G. IEEE Commun. Mag. 52(02), 74–80 (2014)

    Article  Google Scholar 

  2. Shaoyu, L., Chunche, C., Fanmin, T., Tienchen, H.: 3GPP device-to-device communications for beyond 4G cellular networks. IEEE Commun. Mag. 54(03), 28–35 (2016)

    Google Scholar 

  3. Zhenyu, Z., Mianxiong, D., Kaoru, O., Jun, W., Takuro, S.: Energy efficiency and spectral efficiency tradeoff in device-to-device (D2D) communications. IEEE Commun. Lett. 3(05), 485–488 (2014)

    Article  Google Scholar 

  4. Lili, W., Rose, Q.H., Yi, Q., Geng, W.: Enable device-to-device communications underlaying cellular networks: challenges and research aspects. IEEE Commun. Mag. 52(06), 90–96 (2014)

    Article  Google Scholar 

  5. Wanbing, H., Wei Z., Wei B., Yueming C., Xinrong G., Junyue Q.: Improving physical layer security in underlay D2D communication via stackelberg game based power control. In: 2016 IEEE International Conference on Computer, Information and Telecommunication Systems (CITS), pp. 1–5. IEEE Press, Kunming (2016)

    Google Scholar 

  6. Rongqing, Z., Xiang, C., Liuqing, Y.: Joint power and access control for physical layer security in d2d communications underlaying cellular networks. In: 2016 IEEE International Conference on Communications (ICC), pp. 1–6, IEEE Press, Kuala Lumpur (2016)

    Google Scholar 

  7. Rongqing, Z., Xiang, C., Liuqing, Y.: Cooperation via spectrum sharing for physical layer security in device-to-device communications underlaying cellular networks. IEEE Trans. Wirel. Commun. 15(8), 5651–5663 (2016)

    Article  Google Scholar 

  8. Yang, C., Tao, J., Conggang, W.: Cooperative device-to-device communications in cellular networks. IEEE Wirel. Commun. 22(3), 124–129 (2015)

    Article  Google Scholar 

  9. Yi, Q., Ming, D., Meng, Z., Hui, Y., Hanwen, L.: Relaying robust beamforming for device-to-device communication with channel uncertainty. IEEE Commun. Lett. 18(10), 1859–1862 (2014)

    Article  Google Scholar 

  10. Tuong, D.H., Long, B.L., Tho, L.N.: Joint mode selection and resource allocation for relay-based d2d communications. IEEE Commun. Lett. 21(2), 398–401 (2017)

    Article  Google Scholar 

  11. Lei, W., Yueming, C., Yulong, Z., Weiwei, Y., Lajos, H.: Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays. IEEE Trans. Veh. Technol. 65(8), 6259–6274 (2015)

    Google Scholar 

  12. Chao, W., Huiming, W., Xia, X.: Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks. IEEE Trans. Wirel. Commun. 14(2), 589–605 (2015)

    Article  Google Scholar 

  13. Hui, H., Lee, S., Guobing, L., Junli, L.: Secure relay and jammer selection for physical layer security. IEEE Signal Process. Lett. 22(8), 1147–1151 (2015)

    Article  Google Scholar 

  14. Ning, Z., Nan, C., Ning, L., Xiang, Z., Jon, W.M., Xuemin (Sherman), S.: Partner selection and incentive mechanism for physical layer security. IEEE Trans. Wirel. Commun. 14(8), 4265–4276 (2015)

    Google Scholar 

  15. Yijie, L., Yang, Y., Cui, L.: Research on physical layer security in D2D enabled cellular networks with an active eavesdropper. Signal Proccesing (accepted)

    Google Scholar 

  16. Fudenberg, D., Levine, D.K.: The Theory of Learning in Games. MIT Press, Cambridge (1998)

    MATH  Google Scholar 

  17. Han, Z., et al.: Game Theory in Wireless and Communication Networks. Cambridge University Press, Cambridge (2012)

    Google Scholar 

  18. Watkins, C.J.C.H., Dayan, P.: Q-learning. Mach. Learn. 8, 279–292 (1992)

    MATH  Google Scholar 

  19. Luliang, J., Fuqiang, Y., Youming, S., Yuhua, X., Shuo, F., Alagan, A.: A hierarchical learning solution for antijamming stackelberg game with discrete power strategies. IEEE Wirel. Commun. Lett. 6(6), 818–821 (2017)

    Article  Google Scholar 

  20. Sastry, P.S., Phansalkar, V.V., Thathachar, M.: Decentralized learning of nash equilibria in multi-person stochastic games with incomplete information. IEEE Trans. Syst. Man Cybern. 24(5), 769–777 (1994)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yijie Luo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Luo, Y., Yang, Y., Duan, Y., Yang, Z. (2018). Joint D2D Cooperative Relaying and Friendly Jamming Selection for Physical Layer Security. In: Meng, L., Zhang, Y. (eds) Machine Learning and Intelligent Communications. MLICOM 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 251. Springer, Cham. https://doi.org/10.1007/978-3-030-00557-3_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00557-3_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00556-6

  • Online ISBN: 978-3-030-00557-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics