
基于链路间干扰辅助的中继D2D系统安全通信方法
Jamming Based Secure Relay-Aided D2D Transmission Method
在包含中继节点的D2D(Device-to-Device)系统中,针对蜂窝链路与D2D链路同时受窃听的问题,提出一种基于链路间干扰辅助的中继D2D系统安全通信方法.首先,确定蜂窝链路与D2D链路上下行发送模式;然后,在基站与中继节点的发送信号中添加人工噪声,协作干扰窃听者;最后,对基站功率分配与D2D功率控制进行了优化,以实现不同类型链路间干扰辅助保障系统安全.仿真结果表明,所提出的安全通信方法在保密速率方面比SVD(Singular Value Decomposition)与ZF(Zero-Forcing)预编码方法提高了1.5bit/s/Hz.
To cope with eavesdropping in both the cellular link and the D2D(Device-to-Device) link of relay-aided D2D system,this paper proposes a jamming based secure transmission method.Firstly,the transmission procedures of both the cellular link and the D2D link are modeled.Secondly,an artificial noise (AN) is added into the signal of the base station (BS) and the relay to interfere the eavesdropper.Finally,a joint optimization scheme for the power allocation of BS and the power control of D2D is introduced to maximize the system secrecy rate.Simulation results show that the system ergodic secrecy rate is increased by 1.5bit/s/Hz,which is great improvement compared with the scheme based on SVD and ZF.
D2D通信 / 窃听者 / 人工噪声 / 保密速率 {{custom_keyword}} /
D2D / secure transmission method / artificial noise / secrecy rate {{custom_keyword}} /
[1] Doppler K,Rinne M,Cássio B.Device-to-device communication as an underlay to LTE-Advanced networks[J].IEEE Transactions on Communications Magazine,2009,47(12):42-49.
[2] Chunguo Li,John M Cioffi,Luxi Yang.Optimal energy efficient joint power allocation for two-hop single-antenna relaying systems[J].European Transactions on Telecommunications,2014,25(7):745-751.
[3] Chun G L,Xiang W,Lu X Y,Wei P Z.A joint source and relay power allocation scheme for a class of MIMO relay systems[J].IEEE Transactions on Signal Processing,2009,57(12):4852-4860.
[4] Chun G L,Fan S,John M C,Lu X Y.Energy efficient MIMO relay transmissions via joint power allocations[J].IEEE Transactions on Circuits and Systems-Ⅱ,2014,61(7):531-535.
[5] Chun G L,Hyun J Y,Fan S,John M C,Lu X Y.Multiuser overhearing for cooperative two-way multiantenna relays[J].IEEE Transactions on Vehicular Technology,2015,65(5):1-5.
[6] Wang L,Peng T,Yang Y.Interference constrained D2D communication with relay underlaying cellular networks[A].IEEE International Conference on Vehicular Technology Conference[C].Las Vegas:IEEE,2013.1-5.
[7] Zheng W C,Su Z,Shi X S.Research on relay selection in device-to-device communications based on maximum capacity[A].IEEE International Conference on Information Science,Electronics and Electrical Engineering[C].Sapporo:Institute of Electrical and Electronics Engineers Inc,2014.1429-1434.
[8] Vanganuru K,Ferrante S,Sternberg G.System capacity and coverage of a cellular network with D2D mobile relays[A].IEEE Conference on Military Communications Conference[C].Orlando:IEEE,2012.1-6.
[9] Peng Y,Gao Q,Sun S.Discovery of device-device proximity:Physical layer design for D2D discovery[A].IEEE International Conference on Communications in China-Workshops[C].Xi'an:IEEE,2013.176-181.
[10] YUE J,MA C,YU H,et al.Secrecy-based channel assignment for device-to-device communication:an auction approach[A].IEEE International Conference on Wireless Communications & Signal Processing[C].Hangzhou:IEEE,2013.1-6.
[11] Yue J,Ma C,Yu H.Secrecy-based access control for device-to-device communication cnderlaying cellular networks[J].IEEE Transactions on Communications Letters,IEEE,2013,17(11):2068-2071.
[12] Zhu D,Swindlehurst A L,Fakoorian S A A.Device-to-device communications:the physical layer security advantage[A].IEEE International Conference on Acoustics,Speech and Signal Processing[C].Florence:IEEE,2014.1606-1610.
[13] Zhang H,Wang T,Song L.Radio resource allocation for physical-layer security in D2D underlay communications[A].IEEE International Conference on Communications[C].Sydney:IEEE,2014.2319-2324.
[14] Yu X,Jing Y.SVD-based channel estimation for MIMO relay networks[A].IEEE International Conference on Vehicular Technology Conference[C].Québec City:IEEE,2012.1-5.
[15] Li L,Wang J,Wu X.ZF beamforming performance analysis for multiuser spatial multiplexing with imperfect channel feedback[A].IEEE International Conference on Wireless Communications,Networking and Mobile Computing[C].Shanghai:IEEE,2007.869-872.
[16] Goel S,Negi R.Guaranteeing secrecy using artificial noise[J].IEEE Transactions on Wireless Communications,2008,7(6):2180-2189.
[17] Li J,Petropulu A P.On ergodic secrecy rate for gaussian MISO wiretap channels[J].IEEE Transactions on Wireless Communications,2011,10(4):1176-1187.
国家自然科学基金 (No.61379006); 国家863计划项目 (No.2015AA01A708); 中国博士后科学基金资助项目 (No.2016M592990)
/
〈 |
|
〉 |