Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model

被引:174
|
作者
Liu, Yuanwei [1 ]
Wang, Lifeng [2 ]
Zaidi, Syed Ali Raza [3 ]
Elkashlan, Maged [1 ]
Duong, Trung Q. [4 ]
机构
[1] Queen Mary Univ London, Dept Elect Engn & Comp Sci, London E1 4NS, England
[2] UCL, Dept Elect & Elect Engn, London WC1E 6BT, England
[3] Univ Leeds, Sch Elect & Elect Engn, Leeds LS2 9JT, W Yorkshire, England
[4] Queens Univ Belfast, Sch Elect Elect Engn & Comp Sci, Belfast BT7 1NN, Antrim, North Ireland
关键词
Cognitive cellular networks; D2D communication; physical layer security; stochastic geometry; wireless power transfer; PHYSICAL LAYER SECURITY; STOCHASTIC GEOMETRY; INFORMATION; UNDERLAY; ARCHITECTURE; THROUGHPUT; BREAKING; DESIGN;
D O I
10.1109/TCOMM.2015.2498171
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multiantenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the primary base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, three wireless power transfer (WPT) policies are proposed: 1) co-operative power beacons (CPB) power transfer, 2) best power beacon (BPB) power transfer, and 3) nearest power beacon (NPB) power transfer. To characterize the power transfer reliability of the proposed three policies, we derive new expressions for the exact power outage probability. Moreover, the analysis of the power outage probability is extended to the case when PBs are equipped with large antenna arrays. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), where the receiver with the strongest channel is selected; and 2) nearest receiver selection (NRS), where the nearest receiver is selected. To assess the secrecy performance, we derive new analytical expressions for the secrecy outage probability and the secrecy throughput considering the two receiver selection schemes using the proposed WPT policies. We presented Monte carlo simulation results to corroborate our analysis and show: 1) secrecy performance improves with increasing densities of PBs and D2D receivers due to larger multiuser diversity gain; 2) CPB achieves better secrecy performance than BPB and NPB but consumes more power; and 3) BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead. A pivotal conclusion is reached that with increasing number of antennas at PBs, NPB offers a comparable secrecy performance to that of BPB but with a lower complexity.
引用
收藏
页码:329 / 342
页数:14
相关论文
共 50 条
  • [31] A Neural Network based Power Allocation Algorithm for D2D Communication in Cellular Networks
    Zheng, Jun
    Jiang, Shurui
    Chen, Wentai
    Zhou, Feifan
    Yang, Luyinru
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [32] D2D Communications Underlaying Wireless Powered Communication Networks
    Wang, Haichao
    Wang, Jinlong
    Ding, Guoru
    Han, Zhu
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (08) : 7872 - 7876
  • [33] On Antenna Selection for D2D Communication Underlaying Cellular Networks
    Wang, Yuyang
    Qiao, Dan
    Jin, Shi
    Wong, Kai-Kit
    Huang, Yongming
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 2097 - 2102
  • [34] Group Based Secure Communication for Large-Scale Wireless Sensor Networks
    Kifayat, Kashif
    Merabti, Madjid
    Shi, Qi
    Llewellyn-Jones, David
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2007, 2 (02): : 139 - 152
  • [35] Spark Spectrum Allocation for D2D Communication in Cellular Networks
    Ahmad, Tanveer
    Khan, Imran
    Irshad, Azeem
    Ahmad, Shafiq
    Soliman, Ahmed T.
    Gardezi, Akber Abid
    Shafiq, Muhammad
    Choi, Jin-Ghoo
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (03): : 6381 - 6394
  • [36] Interference Minimization in D2D Communication Underlaying Cellular Networks
    Hassan, Md. Yeakub
    Hussain, Faisal
    Hossen, Md. Sakhawat
    Choudhury, Salimur
    Alam, Muhammad Mahbub
    IEEE ACCESS, 2017, 5 : 22471 - 22484
  • [37] Transmission Capacity Of D2D Communication Under Cellular Networks
    Xu, Xianghai
    Sun, Jun
    Shao, Shixiang
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER, NETWORKS AND COMMUNICATION ENGINEERING (ICCNCE 2013), 2013, 30 : 375 - 379
  • [38] An Efficient Scheme for Secure Communication in Large-Scale Wireless Sensor Networks
    Su, Zhong
    Lin, Chuang
    Ren, Fengyuan
    Jiang, Yixin
    Chu, Xiaowen
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 333 - +
  • [39] Gamified Approach on Participatory D2D Communication in Cellular Networks
    Nakayama, Yu
    Onodera, Masaru
    Tobe, Yoshito
    2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL), 2020,
  • [40] Analysis of Key Establishment Techniques for Secure D2D Communication in 5G Cellular Networks
    Butt, Amir Aziz
    Chughta, Gohar Rehman
    Kabir, Asif
    Mahmood, Zahid
    Jaffri, Zain ul Abidin
    Olah, Judit
    ACTA MONTANISTICA SLOVACA, 2021, 26 (03) : 395 - 403