Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model

被引:174
|
作者
Liu, Yuanwei [1 ]
Wang, Lifeng [2 ]
Zaidi, Syed Ali Raza [3 ]
Elkashlan, Maged [1 ]
Duong, Trung Q. [4 ]
机构
[1] Queen Mary Univ London, Dept Elect Engn & Comp Sci, London E1 4NS, England
[2] UCL, Dept Elect & Elect Engn, London WC1E 6BT, England
[3] Univ Leeds, Sch Elect & Elect Engn, Leeds LS2 9JT, W Yorkshire, England
[4] Queens Univ Belfast, Sch Elect Elect Engn & Comp Sci, Belfast BT7 1NN, Antrim, North Ireland
关键词
Cognitive cellular networks; D2D communication; physical layer security; stochastic geometry; wireless power transfer; PHYSICAL LAYER SECURITY; STOCHASTIC GEOMETRY; INFORMATION; UNDERLAY; ARCHITECTURE; THROUGHPUT; BREAKING; DESIGN;
D O I
10.1109/TCOMM.2015.2498171
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multiantenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the primary base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, three wireless power transfer (WPT) policies are proposed: 1) co-operative power beacons (CPB) power transfer, 2) best power beacon (BPB) power transfer, and 3) nearest power beacon (NPB) power transfer. To characterize the power transfer reliability of the proposed three policies, we derive new expressions for the exact power outage probability. Moreover, the analysis of the power outage probability is extended to the case when PBs are equipped with large antenna arrays. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), where the receiver with the strongest channel is selected; and 2) nearest receiver selection (NRS), where the nearest receiver is selected. To assess the secrecy performance, we derive new analytical expressions for the secrecy outage probability and the secrecy throughput considering the two receiver selection schemes using the proposed WPT policies. We presented Monte carlo simulation results to corroborate our analysis and show: 1) secrecy performance improves with increasing densities of PBs and D2D receivers due to larger multiuser diversity gain; 2) CPB achieves better secrecy performance than BPB and NPB but consumes more power; and 3) BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead. A pivotal conclusion is reached that with increasing number of antennas at PBs, NPB offers a comparable secrecy performance to that of BPB but with a lower complexity.
引用
收藏
页码:329 / 342
页数:14
相关论文
共 50 条
  • [41] Performance Analysis of Cellular Networks with D2D communication Based on Queuing Theory Model
    Xin, Jianfang
    Zhu, Qi
    Liang, Guangjun
    Zhang, Tiaojiao
    Zhao, Su
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (06): : 2450 - 2469
  • [42] Cooperative HARQ-Assisted NOMA Scheme in Large-Scale D2D Networks
    Shi, Zheng
    Ma, Shaodan
    ElSawy, Hesham
    Yang, Guanghua
    Alouini, Mohamed-Slim
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (09) : 4286 - 4302
  • [43] Social aware joint link and power allocation for D2D communication underlaying cellular networks
    Yang, Lianxin
    Wu, Dan
    Cai, Yueming
    IET COMMUNICATIONS, 2018, 12 (05) : 493 - 500
  • [44] Joint Power Control and Proportional Fair Scheduling for D2D Communication Underlaying Cellular Networks
    Li Xiaoshuai
    Ma Lin
    Xu Yubin
    Shankaran, Rajan
    PROCEEDINGS OF 2016 IEEE 13TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING (ICSP 2016), 2016, : 1308 - 1313
  • [45] Analytical Modeling of Mode Selection and Power Control for Underlay D2D Communication in Cellular Networks
    ElSawy, Hesham
    Hossain, Ekram
    Alouini, Mohamed-Slim
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2014, 62 (11) : 4147 - 4161
  • [46] Feasible D2D Communication Distance in D2D-Enabled Cellular Networks
    Ding, Haichuan
    Ma, Shaodan
    Xing, Chengwen
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), 2014, : 1 - 5
  • [47] Secure Transmissions of D2D Underlay Cellular Networks with Poisson Cluster Process
    Lyu, Jiawei
    Zheng, Tong-Xing
    Huang, Ke-Wen
    Feng, Yuehua
    Wang, Hui-Ming
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [48] Downlink Interference Management for D2D Communication Underlying Cellular Networks
    Guo, Bin
    Sun, Shaohui
    Gao, Qiubin
    2013 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA - WORKSHOPS (CIC/ICCC), 2013, : 193 - 196
  • [49] Beamforming and Interference Cancellation for D2D Communication Underlaying Cellular Networks
    Ni, Yiyang
    Jin, Shi
    Xu, Wei
    Wang, Yuyang
    Matthaiou, Michail
    Zhu, Hongbo
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2016, 64 (02) : 832 - 846
  • [50] Interference Constrained D2D Communication with Relay Underlaying Cellular Networks
    Wang, Lefei
    Peng, Tao
    Yang, Yufeng
    Wang, Wenbo
    2013 IEEE 78TH VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 2013,