Skip to main content
Top
Published in: Annals of Telecommunications 7-8/2016

01-08-2016

Power allocation for device-to-device communication underlaying cellular networks under a probabilistic eavesdropping scenario

Authors: Junyue Qu, Yueming Cai, Jianchao Zheng, Wendong Yang, Dan Wu, Yajie Hu

Published in: Annals of Telecommunications | Issue 7-8/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, we focus on the issue of security due to the open structure of the D2D Communication Underlaying Cellular Networks. In such an open scenario, the problem of interference is very serious. But luckily, the interference can be helpful from a perspective of the physical layer security. The interference caused by D2D communication could be helpful against eavesdroppers to enhance the secure communication of the cellular users when the value of the interference is proper. Note this, the physical layer security of the cellular users can be enhanced with the proper interference management based on the power allocation in D2D communication underlaying cellular networks in a probabilistic eavesdropping scenario. The problem is modeled as a Stackelberg game model. In the model, all cellular users are modeled as followers while the D2D pair is modeled as leader. A semi-centralized power allocation algorithm is proposed to converge to the Stackelberg Equilibrium. And the equilibrium is the final power allocation scheme we want. It is proved that the proposed algorithm can conclude in finite-time iterations. Numerical simulation results show that our proposed power allocation algorithm can obtain larger secrecy data rate, than the other two power allocation algorithms.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Doppler K, Rinne M, Wijting C, Ribeiro C, Hugl K, Nokia Research Center (2009) Device-to-device communication as an underlay to lte-advanced networks. IEEE Commun Mag 47(12):42–49CrossRef Doppler K, Rinne M, Wijting C, Ribeiro C, Hugl K, Nokia Research Center (2009) Device-to-device communication as an underlay to lte-advanced networks. IEEE Commun Mag 47(12):42–49CrossRef
2.
go back to reference Yu C-H, Tirkkonen O, Doppler K, Ribeiro C (2009) On the performance of device-to-device underlay communication with simple power control. In: Proceedings IEEE 69th Vehicular Technology Conference Spring, Barcelona Yu C-H, Tirkkonen O, Doppler K, Ribeiro C (2009) On the performance of device-to-device underlay communication with simple power control. In: Proceedings IEEE 69th Vehicular Technology Conference Spring, Barcelona
3.
go back to reference Lin X, Andrews J, Ghosh A, Ratasuk R (2014) An overview of 3GPP device-to-device proximity services. IEEE Commun Mag 52(4):40–48CrossRef Lin X, Andrews J, Ghosh A, Ratasuk R (2014) An overview of 3GPP device-to-device proximity services. IEEE Commun Mag 52(4):40–48CrossRef
4.
go back to reference Feng D, Lu L, Wu Y, Li G, Li S, Feng G (2014) Device-to-device communications in cellular networks. IEEE Commun Mag 52(4):49–55CrossRef Feng D, Lu L, Wu Y, Li G, Li S, Feng G (2014) Device-to-device communications in cellular networks. IEEE Commun Mag 52(4):49–55CrossRef
5.
go back to reference Alam M, Yang D, Rodriguez J, Abd-Alhameed R (2014) Secure device-to-device communication in LTE-a. IEEE Commun Mag 52(4):66–73CrossRef Alam M, Yang D, Rodriguez J, Abd-Alhameed R (2014) Secure device-to-device communication in LTE-a. IEEE Commun Mag 52(4):66–73CrossRef
6.
go back to reference He Y, Luan X, Wang J, Feng M, Wu J (2014) Power allocation for D2D communications in heterogeneous networks. In: Proceedings of the IEEE International Conference on Advanced Communication Technology, Pyeongchang, Korea He Y, Luan X, Wang J, Feng M, Wu J (2014) Power allocation for D2D communications in heterogeneous networks. In: Proceedings of the IEEE International Conference on Advanced Communication Technology, Pyeongchang, Korea
7.
go back to reference Xu C, Song L, Han Z, Zhao Q, Wang X, Jiao B (2012) Interference-aware resource allocation for device-to-device communications as an underlay using sequential second price auction. In: Proceedings of the IEEE International Conference on Communications, Ottawa Xu C, Song L, Han Z, Zhao Q, Wang X, Jiao B (2012) Interference-aware resource allocation for device-to-device communications as an underlay using sequential second price auction. In: Proceedings of the IEEE International Conference on Communications, Ottawa
8.
go back to reference Xu C, Song L, Han Z, Li D, Jiao B (2012) Resource allocation using a reverse iterative combinatorial auction for device-to-device underlay cellular networks. In: Proceedings of the IEEE Global Communications Conference, Anaheim Xu C, Song L, Han Z, Li D, Jiao B (2012) Resource allocation using a reverse iterative combinatorial auction for device-to-device underlay cellular networks. In: Proceedings of the IEEE Global Communications Conference, Anaheim
9.
go back to reference Wang F, Song L, Han Z, Zhao Q (2013) Joint scheduling and resource allocation for device-to-device underlay communication. In: Proceedings of the IEEE Wireless Communications and Networking Conference, Shanghai, China, pp 732–737 Wang F, Song L, Han Z, Zhao Q (2013) Joint scheduling and resource allocation for device-to-device underlay communication. In: Proceedings of the IEEE Wireless Communications and Networking Conference, Shanghai, China, pp 732–737
10.
go back to reference Wang F, Xu C, Song L, Zhao Q, Wang X, Han Z (2013) Energy-aware resource allocation for device-to-device underlay communication. In: Proceedings of the IEEE International Conference on Communications, Budapest, Hungary Wang F, Xu C, Song L, Zhao Q, Wang X, Han Z (2013) Energy-aware resource allocation for device-to-device underlay communication. In: Proceedings of the IEEE International Conference on Communications, Budapest, Hungary
11.
go back to reference Yue J, Ma C, Yu H, Yang Z, Gan X (2013) Secrecy-based channel assignment for deviceto-device communication: an auction approach. In: Proceedings of the Wireless Communications and Signal Processing (WCSP 2013), Hangzhou Yue J, Ma C, Yu H, Yang Z, Gan X (2013) Secrecy-based channel assignment for deviceto-device communication: an auction approach. In: Proceedings of the Wireless Communications and Signal Processing (WCSP 2013), Hangzhou
12.
go back to reference Yue J, Ma C, Yu H, Zhou W (2013) Secrecy-based access control for device-to-device communication underlaying cellular networks. IEEE Commun Lett 17(11):2068–2071CrossRef Yue J, Ma C, Yu H, Zhou W (2013) Secrecy-based access control for device-to-device communication underlaying cellular networks. IEEE Commun Lett 17(11):2068–2071CrossRef
13.
go back to reference Qu J, Cai Y, Wu D, Chen H (2014) Stackelberg game based power allocation for physical layer security of device-to-device communication underlaying cellular networks. Frequenz 68(5-6):285–295CrossRef Qu J, Cai Y, Wu D, Chen H (2014) Stackelberg game based power allocation for physical layer security of device-to-device communication underlaying cellular networks. Frequenz 68(5-6):285–295CrossRef
14.
go back to reference Duan B, Cai Y, Zheng J, Yang W, Yang W (2014) Bargaining-based jammer power allocation for dynamic eavesdropping scenario. Eurasip J Wirel Commun Netw 2014(1):1– 12CrossRef Duan B, Cai Y, Zheng J, Yang W, Yang W (2014) Bargaining-based jammer power allocation for dynamic eavesdropping scenario. Eurasip J Wirel Commun Netw 2014(1):1– 12CrossRef
15.
go back to reference Chen H, Cai Y, Wu D (2015) Joint spectrum and power allocation for green d2d communication with physical layer security consideration. KSII Trans Internet Inf Syst 9(3):1057– 1073 Chen H, Cai Y, Wu D (2015) Joint spectrum and power allocation for green d2d communication with physical layer security consideration. KSII Trans Internet Inf Syst 9(3):1057– 1073
16.
go back to reference Chen H, Wu D, Cai Y, Guan X (2015) Coalition Formation Based on coalition formation game. In: Proceedings Wireless Communications and Signal Processing (WCSP Nanjing) Chen H, Wu D, Cai Y, Guan X (2015) Coalition Formation Based on coalition formation game. In: Proceedings Wireless Communications and Signal Processing (WCSP Nanjing)
Metadata
Title
Power allocation for device-to-device communication underlaying cellular networks under a probabilistic eavesdropping scenario
Authors
Junyue Qu
Yueming Cai
Jianchao Zheng
Wendong Yang
Dan Wu
Yajie Hu
Publication date
01-08-2016
Publisher
Springer Paris
Published in
Annals of Telecommunications / Issue 7-8/2016
Print ISSN: 0003-4347
Electronic ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-016-0515-x

Other articles of this Issue 7-8/2016

Annals of Telecommunications 7-8/2016 Go to the issue