Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model

被引:174
|
作者
Liu, Yuanwei [1 ]
Wang, Lifeng [2 ]
Zaidi, Syed Ali Raza [3 ]
Elkashlan, Maged [1 ]
Duong, Trung Q. [4 ]
机构
[1] Queen Mary Univ London, Dept Elect Engn & Comp Sci, London E1 4NS, England
[2] UCL, Dept Elect & Elect Engn, London WC1E 6BT, England
[3] Univ Leeds, Sch Elect & Elect Engn, Leeds LS2 9JT, W Yorkshire, England
[4] Queens Univ Belfast, Sch Elect Elect Engn & Comp Sci, Belfast BT7 1NN, Antrim, North Ireland
关键词
Cognitive cellular networks; D2D communication; physical layer security; stochastic geometry; wireless power transfer; PHYSICAL LAYER SECURITY; STOCHASTIC GEOMETRY; INFORMATION; UNDERLAY; ARCHITECTURE; THROUGHPUT; BREAKING; DESIGN;
D O I
10.1109/TCOMM.2015.2498171
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multiantenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the primary base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, three wireless power transfer (WPT) policies are proposed: 1) co-operative power beacons (CPB) power transfer, 2) best power beacon (BPB) power transfer, and 3) nearest power beacon (NPB) power transfer. To characterize the power transfer reliability of the proposed three policies, we derive new expressions for the exact power outage probability. Moreover, the analysis of the power outage probability is extended to the case when PBs are equipped with large antenna arrays. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), where the receiver with the strongest channel is selected; and 2) nearest receiver selection (NRS), where the nearest receiver is selected. To assess the secrecy performance, we derive new analytical expressions for the secrecy outage probability and the secrecy throughput considering the two receiver selection schemes using the proposed WPT policies. We presented Monte carlo simulation results to corroborate our analysis and show: 1) secrecy performance improves with increasing densities of PBs and D2D receivers due to larger multiuser diversity gain; 2) CPB achieves better secrecy performance than BPB and NPB but consumes more power; and 3) BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead. A pivotal conclusion is reached that with increasing number of antennas at PBs, NPB offers a comparable secrecy performance to that of BPB but with a lower complexity.
引用
收藏
页码:329 / 342
页数:14
相关论文
共 50 条
  • [1] Secure D2D Communication in Large-Scale Cognitive Cellular Networks with Wireless Power Transfer
    Liu, Yuanwei
    Wang, Lifeng
    Zaidi, Syed Ali Raza
    Elkashlan, Maged
    Duong, Trung Q.
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 4309 - 4314
  • [2] Caching in Large-Scale Cellular Networks with D2D Assistance
    Demarchou, Eleni
    Psomas, Constantinos
    Krikidis, Ioannis
    PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT 2017), 2017,
  • [3] Simultaneous wireless information and power transfer in heterogeneous cellular networks with underlay D2D communication
    Sreelakshmy, K. R.
    Jacob, Lillykutty
    WIRELESS NETWORKS, 2020, 26 (05) : 3315 - 3330
  • [4] Simultaneous wireless information and power transfer in heterogeneous cellular networks with underlay D2D communication
    K. R. Sreelakshmy
    Lillykutty Jacob
    Wireless Networks, 2020, 26 : 3315 - 3330
  • [5] Energy Efficient Communication for Secure D2D Underlaid Cellular Networks
    Kwon, Younggap
    Suh, Hyunjoon
    Oh, Jintaek
    Hwang, Taewon
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (10) : 9110 - 9123
  • [6] Doubly Securing Large-Scale D2D Networks
    Feng, Shaohan
    Lu, Xiao
    Sun, Sumei
    Niyato, Dusit
    Hossain, Ekram
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 3884 - 3889
  • [7] Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming
    Feng, Shaohan
    Lu, Xiao
    Sun, Sumei
    Niyato, Dusit
    Hossain, Ekram
    arXiv, 2022,
  • [8] Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming
    Feng, Shaohan
    Lu, Xiao
    Sun, Sumei
    Niyato, Dusit
    Hossain, Ekram
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2024, 23 (01) : 592 - 606
  • [9] Achieving Covert Communication in Large-Scale SWIPT-Enabled D2D Networks
    Feng, Shaohan
    Lu, Xiao
    Niyato, Dusit
    Hossain, Ekram
    Sun, Sumei
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2024, 23 (05) : 5272 - 5286
  • [10] An Artificial Noise Scheme for Secure Communication in Heterogeneous D2D and Cellular Networks
    Yan, Shiwei
    Shang, Yong
    Zhang, Xiguang
    Li, Dehuai
    Li, Xiaobo
    2016 IEEE 84TH VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 2016,