Secure opportunistic access control in D2D-enabled cellular network

The mutual interference between cellular links and D2D links can bring the secrecy gain to cellular users in D2D-enable cellular networks.To make full use of them,a cooperative secrecy transmission scheme was proposed based on wireless channels.The channel direction information and gains depict the...

Full description

Saved in:
Bibliographic Details
Main Authors: Yajun CHEN, Xinsheng JI, Kaizhi HUANG, Jing YANG, Ming YI
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2018-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018016/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539427351920640
author Yajun CHEN
Xinsheng JI
Kaizhi HUANG
Jing YANG
Ming YI
author_facet Yajun CHEN
Xinsheng JI
Kaizhi HUANG
Jing YANG
Ming YI
author_sort Yajun CHEN
collection DOAJ
description The mutual interference between cellular links and D2D links can bring the secrecy gain to cellular users in D2D-enable cellular networks.To make full use of them,a cooperative secrecy transmission scheme was proposed based on wireless channels.The channel direction information and gains depict the interference from D2D links to cellular links and other D2D links in the proposed scheme.Firstly,only the D2D users which meet the limited interference conditions were accessed to cellular networks to ensure their reliable communications.It was assumed that legitimate users and eavesdroppers were independent two-dimensional homogeneous Poisson point processes (PPP) distribution.Then the security outage probability (SOP) was derived for cellular users and the connection outage probability (COP) for D2D users,and the impacts of interference thresholds were discussed on their performances.Next,an optimization model was given to minimize D2D users’ COP while ensuring the secrecy performance requirements of cellular users,thus achieving the optimal performance.Finally,simulation results verify the validity of the proposed scheme.
format Article
id doaj-art-68edd56b2bb84870948a93e664a5b4d0
institution Kabale University
issn 1000-436X
language zho
publishDate 2018-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-68edd56b2bb84870948a93e664a5b4d02025-01-14T07:14:09ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-01-013912613659716112Secure opportunistic access control in D2D-enabled cellular networkYajun CHENXinsheng JIKaizhi HUANGJing YANGMing YIThe mutual interference between cellular links and D2D links can bring the secrecy gain to cellular users in D2D-enable cellular networks.To make full use of them,a cooperative secrecy transmission scheme was proposed based on wireless channels.The channel direction information and gains depict the interference from D2D links to cellular links and other D2D links in the proposed scheme.Firstly,only the D2D users which meet the limited interference conditions were accessed to cellular networks to ensure their reliable communications.It was assumed that legitimate users and eavesdroppers were independent two-dimensional homogeneous Poisson point processes (PPP) distribution.Then the security outage probability (SOP) was derived for cellular users and the connection outage probability (COP) for D2D users,and the impacts of interference thresholds were discussed on their performances.Next,an optimization model was given to minimize D2D users’ COP while ensuring the secrecy performance requirements of cellular users,thus achieving the optimal performance.Finally,simulation results verify the validity of the proposed scheme.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018016/D2D communicationPoisson point processsecrecy outage probabilityconnection outage probabilityjoint search method
spellingShingle Yajun CHEN
Xinsheng JI
Kaizhi HUANG
Jing YANG
Ming YI
Secure opportunistic access control in D2D-enabled cellular network
Tongxin xuebao
D2D communication
Poisson point process
secrecy outage probability
connection outage probability
joint search method
title Secure opportunistic access control in D2D-enabled cellular network
title_full Secure opportunistic access control in D2D-enabled cellular network
title_fullStr Secure opportunistic access control in D2D-enabled cellular network
title_full_unstemmed Secure opportunistic access control in D2D-enabled cellular network
title_short Secure opportunistic access control in D2D-enabled cellular network
title_sort secure opportunistic access control in d2d enabled cellular network
topic D2D communication
Poisson point process
secrecy outage probability
connection outage probability
joint search method
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018016/
work_keys_str_mv AT yajunchen secureopportunisticaccesscontrolind2denabledcellularnetwork
AT xinshengji secureopportunisticaccesscontrolind2denabledcellularnetwork
AT kaizhihuang secureopportunisticaccesscontrolind2denabledcellularnetwork
AT jingyang secureopportunisticaccesscontrolind2denabledcellularnetwork
AT mingyi secureopportunisticaccesscontrolind2denabledcellularnetwork