Next Article in Journal
Visualization, Interaction and Analysis of Heterogeneous Textbook Resources
Previous Article in Journal
Research Trend on the Use of IT in Digital Addiction: An Investigation Using a Systematic Literature Review
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure Communication for Uplink Cellular Networks Assisted with Full-Duplex Device-to-Device User

1
Engineering Optimization and Smart Antenna Institute, Northeastern University, Qinhuangdao 066004, China
2
School of Computer Science and Engineering, Northeastern University, Shenyang 110819, China
*
Author to whom correspondence should be addressed.
Future Internet 2020, 12(10), 175; https://doi.org/10.3390/fi12100175
Submission received: 26 September 2020 / Revised: 12 October 2020 / Accepted: 16 October 2020 / Published: 18 October 2020
(This article belongs to the Section Cybersecurity)

Abstract

:
In this paper, the secure communication based on the full-duplex (FD) device-to-device (D2D) in cellular networks is proposed. For the proposed scheme, the novel model is established, in which a D2D user is played as a relay operating in FD mode to assist in the secure transmission of uplink information. Considering that the D2D user as a relay is untrusted, D2D link rate maximization is formulated with the constraint of secrecy rate, which ensures the security of uplink cellular networks. To cope with the optimization problem, the optimal power allocation factors of the cellular user (CU) and the D2D user are jointly optimized. Firstly, by using the monotonicity of the objective function, the optimal solution of the power allocation factor at the D2D user can be obtained. Subsequently, the closed-form expression of the optimal power allocation factor at the CU is derived and verified that the solution is the global minimum point. Simulation results verify that the proposed scheme has better output performance than the conventional scheme.

1. Introduction

The increasing use of wireless devices has led to explosive growth in data traffic, so wireless spectrum resources are becoming increasingly scarce [1,2,3]. D2D communication as an underlying network can share the cellular communication resources to realize information transmission between D2D users, which improves the utilization of spectrum resources [4,5]. At the same time, the D2D cellular network has reliable synchronism by using the joint detection method [6]. In [7], the power control problem is studied by using a game-theoretic method based on sigmoid cost function for the underlying D2D network. Furthermore, when the distance between the CU and the base station (BS) is very long, the D2D user can act as a relay to assist the cellular link transmission. By using cooperative protocols, such as amplify and forward (AF), decode and forward (DF) and quantize and forward (QF), the cooperative D2D communication not only ensures reliable and effective information transmission [8,9], but also reduces the performance degradation of the CUs caused by the D2D users reusing the cellular networks spectrums. Therefore, both the CUs and the D2D users can benefit from the cooperation, and some existing studies have shown that D2D-assisted cellular networks can better improve system performance. In [10], a two-way communication scheme between BS and CU in two time slots based on D2D assistance is proposed. On this basis, considering the interference caused by the D2D reuse of cellular network resources, a superposition coding scheme [11] is proposed at the D2D transmitter and the power allocated to assist the downlink transmission of the cellular is minimized. Considering multiple D2D pairs and CUs, the weighted sum energy efficiency [12] of the D2D user is maximized through bandwidth allocation, power allocation, and selection of the optimal D2D user as a relay. In addition, Kim et al. propose a half-duplex (HD) D2D-assisted cooperative relay system [13] using non-orthogonal multiple access which can achieve maximum total capacity scaling.
The aforementioned studies have focused on D2D cooperation in HD mode, which lose spectrum resources. The combination of FD technology and D2D communication underlaying cellular networks can effectively improve the spectrum efficiency of the system [14,15]. However, the FD technology causes self-interference, which restricts the performance improvement of the FD wireless communication system to a certain extent. In fact, the current self-interference cancellation technology (SIC) has made a huge breakthrough [16,17,18], and D2D in FD mode to assist cellular transmission becomes practical. A beam-based analog SIC scheme for FD MIMO systems is proposed in [14], which can effectively eliminate self-interference. However, there is still residual self-interference after analog SIC, and digital SIC is a supplement to the previous analog cancellation. The nonlinear digital SIC [15] is achieved by pre-calibrating at the transmitter. A more general technique is studied in [16], and a framework that combines digital SIC and analog SIC is established to adaptively eliminate various interferences in dynamic environments. For D2D communication using FD technology, the feasibility of the FD function of D2D communication is proven in a heterogeneous network and a solution is obtained to reduce interference in an FD D2D network [19]. In [20], a virtual carrier scheme is proposed to solve the problem of intercarrier interference in V2V networks.
Nevertheless, the inherent openness of wireless communication threatens the security of wireless networks [21,22]. For D2D user-assisted cellular communication, since the D2D user as a relay may try to decode the signal to be forwarded, it is vital to protect the secure transmission of cellular link information. However, conventional encryption technology is difficult to implement in cooperative communication networks because of its complexity and a huge amount of calculation. From the perspective of the physical layer, physical layer security technology uses channel characteristics to protect information transmission, which can greatly enhance the security of the communication system [23,24,25]. Thus, physical layer security technology in this paper is adopted to increase the security of cellular networks based on D2D in FD mode.
The main contributions of our proposed scheme can be summarized as follows:
(1)
A novel secure cooperative communication model is proposed to simultaneously solve the problems of long-distance cellular uplink transmission and reliability of auxiliary transmission. In the established system model, the D2D user can play the role of relay to assist in the information transmission from CU to BS. As the low spectrum efficiency of HD, the relay in this paper is operated in FD mode to shorten the transmission time slot, which is not involved in [9,10,11,12]. Unlike the existing works, we consider the reliability of D2D user-assisted transmission, which means that the relay is untrusted at the data level. Alternatively, the relay may decode confidential information from the received signal. In order to ensure secure communication between the CU and the BS, the CU transmits a signal that combines a confidential signal and an interference signal to reduce the signal to noise ratio (SNR) of the untrusted relay.
(2)
Based on physical layer security, the secrecy rate is defined as the rate difference between the legal link and wiretapping link. Therefore, we first derive the expression of the secrecy rate of the cellular uplink for the untrusted relay. If the secrecy rate is greater than a positive threshold, it indicates that the D2D user cannot successfully decode the confidential information. Considering the interference of the CU to the D2D user, the instantaneous rate expression of D2D is obtained. Subsequently, an optimization problem to maximize the D2D link rate is formulated.
(3)
For the optimization problem formulated, we jointly optimized the power allocation factors of the CU and the D2D user. Specifically, the optimal power allocation factor at the D2D user is obtained based on the monotonicity of the objective function. Then we prove that the power allocation factor at CU is optimal.
The remainder of this paper is organized as follows. Section 2 describes the considered system model of cellular networks based on the relay played by D2D in FD mode. In Section 3, we formulate the D2D link rate maximization problem with the constraint of cellular secrecy rate. Moreover, the power allocation factors at CU and the D2D user is optimized. In Section 4, simulation results verify the performance of our proposed scheme compared with the conventional scheme. Finally, Section 5 concludes this paper.

2. System Model

The system model is shown in Figure 1. We consider a network composed of a BS, a CU and a pair of D2D users (D1, D2). Among them, D1 is operated in FD and equipped with a transmitting antenna and a receiving antenna, CU and D2 are equipped with a single antenna. Due to long-distance transmission, CU and BS cannot communicate directly, and only an untrusted D2D device (D1) is relay assisted in communication.
From Figure 1, CU and D2 can send their communication requests to BS with the assistance of D1. BS sends the control message to D1, and control information can be obtained by CU and D2 from D1. Initially, a signal combined with the confidential signal and the jamming signal is transmitted from the CU to D1. Then D1 forwards the signal from the CU to the BS, and at the same time communicates with D2. Since D2D reuses the spectrum resources of the cellular uplink, interference occurs between the D2D link and the cellular uplink.
In addition, the channel gain model is adopted as follows:
h i j = g i j d i j θ
where i ( C , 1 , B ) , j ( 1 , 2 ) , g i j is the channel coefficient, d i j is the distance between node i and node j , and θ denotes the path loss exponent. All the channels are assumed to be narrow-band quasi-static and frequency flat fading.
First, CU transmits the confidential signal x s with power β P and the jamming signal x z with power ( 1 β ) P , inhere β represents the power allocation factor between x s and x z at CU. The signal y D 1 received at the D1 can be written as:
y D 1 = β P C h C 1 x s + ( 1 β ) P C h C 1 x z + κ P D f 1 x D + n D 1
where P C and P D are the transmit power from CU and D1, respectively, f 1 is the self-interference channel, the parameter κ [ 0 , 1 ] is the cancellation coefficient, which is used to characterize the influence of self-interference on FD communication, x D is the signal from D1, and n D 1 ~ C N ( 0 , σ 2 ) is the additive noise at D1.
Subsequently, D1 receives the signal from CU, and assigns part fraction α of the available power to amplify and forward the signal to the BS, inhere α is the power allocation factor at D1. The remaining 1 α is used for D2D communication. We assume that the BS can eliminate the interference from D2D communication through successive interference cancellation technology when 0 α 1 / 2 [26,27]. The signal y B received at the BS can be written as:
y B = G h B 1 y D 1 + n B = β P C G h C 1 h B 1 x s + ( 1 β ) P C G h C 1 h B 1 x z + κ P D G h B 1 f 1 x D + G h B 1 n D 1 + n B
where n B ~ C N ( 0 , σ 2 ) is the additive noise at BS, and the parameter G is denoted as the amplifying gain at D1, which can be considered by normalization of the received signal, i.e.,
G = α P D P C | h C 1 | 2 + κ P D | f 1 | 2 + σ 2
The signal y D 2 received at the D2 can be written as:
y D 2 = ( 1 α ) P D h 12 x D + β P C h C 2 x s + ( 1 β ) P C h C 2 x z + α P D h 12 x D + n D 2
where n D 2 ~ C N ( 0 , σ 2 ) is the additive noise at D2.

3. Problem Formulation and Analysis

In this section, we propose a secure communication scheme that maximizes the achievable rate of the D2D link with the constraint of the secrecy rate of the cellular uplink. The optimization problem is solved by deriving the power allocation factors of CU and D1. First of all, the optimal power allocation factor of D1 is obtained according to the monotonicity of the objective function. Then after verifying that the solution is the global minimum point, the closed-form solution of the optimal power allocation factor of the CU is derived.
The instantaneous SINR at D1 can be described as:
γ D 1 = β P C γ C 1 ( 1 β ) P C γ C 1 + κ P D γ 1 + 1
where γ C 1 and γ 1 are channel-to-noise ratios (CNRs) of the link from CU to D1 and the self-interference channel, respectively, defined as:
γ C 1 = | h C 1 | 2 / σ 2
γ 1 = | f 1 | 2 / σ 2
The achievable rate of D1 is given by:
R 1 = W log 2 ( 1 + β P C γ C 1 ( 1 β ) P C γ C 1 + κ P D γ 1 + 1 )
where the parameter W is the system bandwidth.
D1 employs the FD AF protocol to assist the cellular uplink transmission. The jamming signal is assumed to be known in advance by the BS, so that the BS is able to cancel out the jamming signal from the received signal. Then the instantaneous SINR at BS is expressed as:
γ B = α β P C P D γ C 1 γ B 1 κ α P D 2 γ 1 γ B 1 + α P D γ B 1 + P C γ C 1 + κ P D γ 1 + 1
where γ B 1 is CNRs of the link from D1 to BS, defined as:
γ B 1 = | h B 1 | 2 / σ 2
The achievable rate of cellular uplink communication is given by:
R C = W log 2 ( 1 + α β P C P D γ C 1 γ B 1 κ α P D 2 γ 1 γ B 1 + α P D γ B 1 + P C γ C 1 + κ P D γ 1 + 1 )
Due to the reuse of the cellular uplink spectrum, the cellular uplink will cause interference to D2. So the instantaneous SINR at D2 can be described as:
γ D 2 = ( 1 α ) P D γ 12 P C γ C 2 + α P D γ 12 + 1
where γ C 2 and γ 12 are the CNRs of the links from CU and D1 to D2, respectively, defined as:
γ C 2 = | h C 2 | 2 / σ 2
γ 12 = | h 12 | 2 / σ 2
The achievable rate of D2D communication is given by:
R D = W log 2 ( 1 + ( 1 α ) P D γ 12 P C γ C 2 + α P D γ 12 + 1 )
For simplicity, R D can be rewritten as:
R D = W log 2 ( 1 + F ( α ) )
where the parameter F ( α ) is given by:
F ( α ) = ( 1 α ) P D γ 12 P C γ C 2 + α P D γ 12 + 1
Therefore, the optimization function of the proposed scheme can be expressed as:
arg max α , β   R D ( α , β )
s . t .   [ R C R 1 ] + R t h
0 α 1 / 2
0 β 1
where R t h represents the secrecy rate threshold of the cellular uplink.
Then, substituting (9) and (12) into the constraint (19a) with secrecy rate, as follows:
1 + α β P C P D γ C 1 γ B 1 κ α P D 2 γ 1 γ B 1 + α P D γ B 1 + P C γ C 1 + κ P D γ 1 + 1 1 + β P C γ C 1 ( 1 β ) P C γ C 1 + κ P D γ 1 + 1 η
where the parameter η is given as:
η = 2 R t h / W
According to (20), we can derive that:
α ( P C γ C 1 + κ P D γ 1 + 1 ) [ ( η 1 + β ) P C γ C 1 + ( κ P D γ 1 + 1 ) ( η 1 ) ] P D γ B 1 [ β ( 1 β ) P C 2 γ C 1 2 ( κ P D γ 1 + 1 ) ( η 1 ) ( P C γ C 1 + κ P D γ 1 + 1 ) ]
From (17), we can easily see that R D is a monotonically increasing function with respect to F ( α ) , so we obtain the optimal object R D (19) by solving the maximum value of F ( α ) . The derivative of F ( α ) (18) with respect to α can be derived as follows:
F ( α ) α = ( P C P D γ C 2 γ 12 + P D γ 12 + P D 2 γ 12 2 ) ( P C γ C 2 + α P D γ 12 + 1 ) 2 < 0
We note that F ( α ) is a monotonically decreasing function with respect to α , so according to the range of α derived in (22), the optimal power allocation factor α with respect to β that maximizes F ( α ) can be obtained:
α = ( P C γ C 1 + κ P D γ 1 + 1 ) [ ( η 1 + β ) P C γ C 1 + ( κ P D γ 1 + 1 ) ( η 1 ) ] P D γ B 1 [ β ( 1 β ) P C 2 γ C 1 2 ( κ P D γ 1 + 1 ) ( η 1 ) ( P C γ C 1 + κ P D γ 1 + 1 ) ]
Furthermore, in order to obtain the optimal value of power allocation factor β at CU that minimizes α , we calculate the derivative of α with respect to β and set it to 0, as follows:
α β = b c β 2 + 2 a c β ( a c + b d ) [ c β ( 1 β ) d ] 2 = 0
where,
a = ( P C γ C 1 + κ P D γ 1 + 1 ) 2 ( η 1 ) b = ( P C γ C 1 + κ P D γ 1 + 1 ) P C γ C 1 c = P C 2 γ C 1 2 P D γ B 1 d = P D γ B 1 ( κ P D γ 1 + 1 ) ( η 1 ) ( P C γ C 1 + κ P D γ 1 + 1 )
It can be observed that the optimal value of β is obtained by solving the Equation (25). From (25), we derive that:
b c β 2 + 2 a c β ( a c + b d ) = 0
According to the properties of the quadratic equation, we can calculate that the root discriminant Δ = ( 2 a c ) 2 + 4 b c ( a c + b d ) > 0 of the Equation (27). Since the coefficient b c of the quadratic term (27) is greater than zero, so there are two solutions to the Equation (27), denoted by β 1 and β 2 , which can be obtained as follows:
β 1 = 2 a c Δ 2 b c
and
β 2 = 2 a c + Δ 2 b c
As β ( , β 1 ) and β ( β 2 , + ) , we obtain that the derivative α β is greater than 0 according to the properties of the quadratic equation, then α is a monotonically increasing function of β . The derivative α β is less than 0 as β ( β 1 , β 2 ) , that is, α is a monotonic decreasing function of β . Obviously, β 2 is the minimum point. Moreover, since β 1 < 0 and β 2 > 0 , β 2 is the global minimum point. Therefore, the optimal power allocation factor β at CU can be expressed as:
β = β 2 = 2 a c + 2 b c = ( P C γ C 1 + κ P D γ 1 + 1 ) [ η ( η 1 ) ( η 1 ) ] P C γ C 1
Thus, the optimization object R D in Equation (19) can be obtained by the optimal power allocation factor α of CU and the optimal power allocation factor β of D1.

4. Simulation Results and Analysis

In this section, simulation results can present the performance of two different schemes, including the proposed FD scheme and the conventional HD scheme. For the conventional HD scheme, we still consider that the D2D user as a relay is untrusted, but the D2D user is operated in HD mode to assist cellular uplink transmission while reusing the cellular spectrum to achieve D2D communication. The instantaneous SINRs at D1, BS and D2 can be formulated as:
γ D 1 H D = β P C γ C 1 ( 1 β ) P C γ C 1 + 1
γ B H D = α β P C P D γ C 1 γ B 1 α P D γ B 1 + P C γ C 1 + 1
γ D 2 H D = ( 1 α ) P D γ 12 P C γ C 2 + α P D γ 12 + 1
The optimal power allocation factors at D1 and CU in the HD scheme can be expressed as:
α H D = ( P C γ C 1 + 1 ) [ ( η 2 1 ) ( P C γ C 1 + 1 ) + β P C γ C 1 ] P D γ B 1 [ β ( 1 β ) P C 2 γ C 1 2 ( η 2 1 ) ( P C γ C 1 + 1 ) ]
β H D = ( P C γ C 1 + 1 ) [ η 2 ( η 2 1 ) ( η 2 1 ) ] P C γ C 1
For the Monte Carlo experiment, the simulation results are averaged over 1000 independent channel realizations. Simulation parameters are elaborated in Table 1.
Figure 2 shows the optimal power allocation factor β at CU versus various secrecy rate threshold R t h . We set cancellation coefficients κ as 0.001, 0.005 and 0.01, respectively. As shown in Figure 2, the optimal power allocation factor at CU will monotonically increase as the secrecy rate threshold increases. The reason is that the CU allocates more power to transmit the confidential signal to increase the cellular link rate, which can improve the security of the relay. In addition, the larger β can be obtained, as the cancellation coefficient κ is bigger.
The optimal power allocation factor α at D1 versus R t h under different SIC levels is shown in Figure 3. From Figure 3, when the secrecy rate threshold is 1, the optimal power factor α with κ = 0.01 is approximately 0.48, the optimal power factor α with κ = 0.008 is about 0.39, and the optimal power factor α with κ = 0.005 is only 0.3. That is because the smaller cellular uplink rates can be obtained, as the cancellation coefficient is greater. In order to ensure that the cellular communication can achieve a secrecy rate, D1 must allocate more power to assist in transmission, which also causes the D2D link rate to drop.
The D2D link rate R D versus secrecy rate threshold R t h in the proposed FD scheme and the conventional HD scheme is shown in Figure 4. As can be seen from Figure 4, the output performance of the proposed FD scheme is better than the HD scheme, and the D2D link rate decreases as the secrecy rate threshold R t h increases. Furthermore, the D2D link rate with κ = 0.01 in the proposed FD scheme is less than with κ = 0.005 .
Figure 5 displays the optimal allocation factor versus the cancellation coefficient κ , in which the secrecy rate thresholds are set as 0.1, 0.5 and 1, respectively. From Figure 5, when the secrecy rate threshold is 1, the optimal power allocation factor β is greater than that when the secrecy rate threshold is 0.1 and 0.5. Specifically, when the cancellation coefficient κ is 0.008, the power allocation factor β with R t h = 1 is greater than that with R t h = 0.5 , and about 0.2 larger than that with R t h = 0.1 .
The curves of the optimal allocation factor α versus various cancellation coefficient are plotted in Figure 6. The optimal power allocation factor α is a monotonically increasing function with respect to the cancellation coefficient κ .
Figure 7 compares the optimal D2D link rates of our proposed FD scheme and the conventional HD scheme with various cancellation coefficient κ . Obviously, the performance of the conventional HD scheme where the cancellation coefficient κ ranges from 0.005 to 0.01 is worse than the proposed FD scheme. When the cancellation coefficient κ is 0.005, the D2D link rate R t h = 0.5 in the proposed FD scheme is approximately 1.8 bps larger than that of the conventional HD scheme. Moreover, the D2D link rate R t h = 0.5 is better than that R t h = 1 in the proposed FD scheme.
Figure 8 compares the optimal D2D link rates of two schemes, which concludes the scheme with the optimal power allocation factor α at D1 and the scheme with fixed power allocation factor α versus various power of D1. The fixed power allocation factor is set as 0.4. It can be seen that the optimal power allocation factor scheme can achieve a larger D2D link rate as compared to the scheme with the fixed α . In the proposed scheme, the D2D rate is about 6.9 bps, while in the fixed power allocation factor scheme, the D2D rate can only achieve approximately 4.2 bps. In addition, the optimal D2D link rates become good with the increase of the power of D1.

5. Conclusions

We propose a secure communication scheme suitable for FD D2D user-assisted cellular uplink transmission. In this scheme, the cooperative D2D communication model is built for realizing long-distance cellular uplink transmission and reliable cooperative transmission. In particular, the D2D user as a relay is operated in FD mode to improve the spectrum efficiency of the system, and the combination of the confidential signal and the interference signal is transmitted by the CU so that the untrusted relay cannot successfully decode the information to be forwarded to the BS. We formulate our problem in order to maximize the D2D link rate while achieving a secrecy rate for the cellular uplink. The closed-form expressions of the power allocation factors at the D2D user and the CU are derived. The simulation results show that the D2D link rate of the proposed FD scheme is significantly improved compared with the conventional HD scheme.

Author Contributions

Conceptualization, L.X.; data curation, L.X.; formal analysis, L.X.; funding acquisition, X.S.; methodology, L.X.; project administration, X.S.; software, L.X.; supervision, X.S.; validation, L.X. and S.X.; visualization, L.X.; writing—original draft, L.X.; writing—review and editing, X.S., L.X., S.X. and Y.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Nature Science Foundation of China under Grant 61473066 and Grant 61601109, in part by the Fundamental Research Funds for the Central Universities under Grant No. N152305001, and in part by the Natural Science Foundation of Hebei Province under Grant F2017501039.

Acknowledgments

The authors thank the anonymous reviewers for their insightful comments that helped improve the quality of this study.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Matinmikko-Blue, M.; Yrjola, S.; Seppanen, V.; Ahokangas, P.; Hammainen, H.; Latva-Aho, M. Analysis of spectrum valuation approaches: The viewpoint of local 5G networks in shared spectrum bands. In Proceedings of the 2018 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), Seoul, Korea, 22–25 October 2018; pp. 1–9. [Google Scholar]
  2. Kour, H.; Jha, R.K. Power optimization using spectrum sharing for next generation cellular networks. In Proceedings of the 2019 11th International Conference on Communication Systems & Networks (COMSNETS), Bengaluru, India, 7–11 January 2019; pp. 562–564. [Google Scholar]
  3. Bhandari, S.; Bhandari, M.; Joshi, S. Spectrum sharing in cognitive radio networks for 5G Vision. In Proceedings of the 2019 Second International Conference on Advanced Computational and Communication Paradigms (ICACCP), Gangtok, India, 25–28 February2019; pp. 1–6. [Google Scholar]
  4. Yu, C.-H.; Doppler, K.; Ribeiro, C.B.; Tirkkonen, O. Resource sharing optimization for device-to-device communication underlaying cellular networks. IEEE Trans. Wirel. Commun. 2011, 10, 2752–2763. [Google Scholar] [CrossRef]
  5. Fodor, G.; Dahlman, E.; Mildh, G.; Parkvall, S.; Reider, N.; Miklós, G.; Turányi, Z. Design aspects of network assisted device-to-device communications. IEEE Commun. Mag. 2012, 50, 170–177. [Google Scholar] [CrossRef]
  6. Jung, Y.-A.; Song, H.-K.; You, Y.-H. Improved joint estimation of set information and frequency offset for LTE device-to-device communications. Appl. Sci. 2019, 10, 77. [Google Scholar] [CrossRef] [Green Version]
  7. Al-Gumaei, Y.A.; Aslam, N.; Al-Saman, A.M.; Al-Hadhrami, T.; Noordin, K.A.; Fazea, Y. Non-cooperative power control game in D2D underlying networks with variant system conditions. Electronics 2019, 8, 1113. [Google Scholar] [CrossRef] [Green Version]
  8. Cao, Y.; Jiang, T.; Wang, C. Cooperative device-to-device communications in cellular networks. IEEE Wirel. Commun. 2015, 22, 124–129. [Google Scholar] [CrossRef]
  9. Jiang, L.; Qin, C.; Zhang, X.; Tian, H. Secure beamforming design for SWIPT in cooperative D2D communications. China Commun. 2017, 14, 20–33. [Google Scholar] [CrossRef]
  10. Pei, Y.; Liang, Y.-C. Resource allocation for device-to-device communications overlaying two-way cellular networks. IEEE Trans. Wirel. Commun. 2013, 12, 3611–3621. [Google Scholar] [CrossRef]
  11. Shalmashi, S.; Ben Slimane, S. Cooperative device-to-device communications in the downlink of cellular networks. In Proceedings of the 2014 IEEE Wireless Communications and Networking Conference (WCNC), Istanbul, Turkey, 6–9 April 2014; pp. 2265–2270. [Google Scholar]
  12. Wu, Q.; Li, G.Y.; Chen, W.; Ng, D.W.K. Energy-efficient D2D overlaying communications with spectrum-power trading. IEEE Trans. Wirel. Commun. 2017, 16, 4404–4419. [Google Scholar] [CrossRef]
  13. Kim, J.-B.; Lee, I.-H.; Lee, J. Capacity scaling for D2D aided cooperative relaying systems using NOMA. IEEE Wirel. Commun. Lett. 2017, 7, 42–45. [Google Scholar] [CrossRef]
  14. Ali, K.S.; ElSawy, H.; Alouini, M.-S. Modeling cellular networks with full-duplex D2D communication: A stochastic geometry approach. IEEE Trans. Commun. 2016, 64, 4409–4424. [Google Scholar] [CrossRef] [Green Version]
  15. Vu, H.V.; Tran, N.H.; Le-Ngoc, T. Full-duplex device-to-device cellular networks: Power control and performance analysis. IEEE Trans. Veh. Technol. 2019, 68, 3952–3966. [Google Scholar] [CrossRef]
  16. Le, A.T.; Tran, L.C.; Huang, X.; Guo, Y.J. Beam-based analog self-interference cancellation in full-duplex MIMO systems. IEEE Trans. Wirel. Commun. 2020, 19, 2460–2471. [Google Scholar] [CrossRef] [Green Version]
  17. Sim, M.S.; Chung, M.; Kim, D.K.; Chae, C.-B. Low-complexity nonlinear self-interference cancellation for full-duplex radios. In Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, 4–8 December 2016; pp. 1–6. [Google Scholar]
  18. Jha, U.S.; Harris, F. Spectral efficiency enhancements utilizing analog RF frontend in-band interference cancellation. In Proceedings of the 2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC), Bali, Indonesia, 17–20 December 2017; pp. 112–116. [Google Scholar]
  19. Wang, L.; Tian, F.; Svensson, T.; Feng, D.; Song, M.; Li, S. Exploiting full duplex for device-to-device communications in heterogeneous networks. IEEE Commun. Mag. 2015, 53, 146–152. [Google Scholar] [CrossRef]
  20. Del Puerto-Flores, J.A.; Cortez, J.; Gutierrez, C.A.; Del Valle-Soto, C.; Velazquez, R.; Valdivia, L.J. Performance of MRC detection in OFDM system with virtual carriers over V2V channels. In Proceedings of the 2019 IEEE 39th Central America and Panama Convention (CONCAPAN XXXIX), Guatemala City, Guatemala, 20–22 November 2019; pp. 1–6. [Google Scholar]
  21. Vij, S.; Jain, A. 5G: Evolution of a secure mobile technology. In Proceedings of the 2016 3rd International Conference on Computing for Sustainable Global Development, New Delhi, India, 16–18 March 2016; pp. 2192–2196. [Google Scholar]
  22. Fang, D.; Qian, Y.; Hu, R.Q. Security for 5G mobile wireless networks. IEEE Access 2017, 6, 4850–4874. [Google Scholar] [CrossRef]
  23. Wang, W.; Teh, K.C.; Li, K.H. Enhanced physical layer security in D2D spectrum sharing networks. IEEE Wirel. Commun. Lett. 2016, 6, 1. [Google Scholar] [CrossRef]
  24. Khoshafa, M.H.; Ngatched, T.M.N.; Ahmed, M.H.; Ibrahim, A. Improving physical layer security of cellular networks using full-duplex jamming relay-aided D2D communications. IEEE Access 2020, 8, 53575–53586. [Google Scholar] [CrossRef]
  25. Li, Q.; Ren, P.; Xu, D. Security enhancement and QoS provisioning for NOMA-based cooperative D2D networks. IEEE Access 2019, 7, 129387–129401. [Google Scholar] [CrossRef]
  26. Yang, Z.; Ding, Z.; Fan, P.; Karagiannidis, G.K. On the performance of non-orthogonal multiple access systems with partial channel information. IEEE Trans. Commun. 2015, 64, 654–667. [Google Scholar] [CrossRef]
  27. Hanif, M.F.; Ding, Z.; Ratnarajah, T.; Karagiannidis, G.K. A Minorization-maximization method for optimizing sum rate in the downlink of non-orthogonal multiple access systems. IEEE Trans. Signal Process. 2015, 64, 76–88. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Device-to-device (D2D) communication system based on full duplex (FD) relay.
Figure 1. Device-to-device (D2D) communication system based on full duplex (FD) relay.
Futureinternet 12 00175 g001
Figure 2. The optimal power allocation factor at cellular user (CU) under various secrecy rate thresholds.
Figure 2. The optimal power allocation factor at cellular user (CU) under various secrecy rate thresholds.
Futureinternet 12 00175 g002
Figure 3. The optimal power allocation factor at D1 versus secrecy rate threshold.
Figure 3. The optimal power allocation factor at D1 versus secrecy rate threshold.
Futureinternet 12 00175 g003
Figure 4. The D2D link rates of FD and half duplex (HD) modes.
Figure 4. The D2D link rates of FD and half duplex (HD) modes.
Futureinternet 12 00175 g004
Figure 5. The optimal power allocation factor at CU versus cancellation coefficient.
Figure 5. The optimal power allocation factor at CU versus cancellation coefficient.
Futureinternet 12 00175 g005
Figure 6. The optimal power allocation factor at D1 under various cancellation coefficient.
Figure 6. The optimal power allocation factor at D1 under various cancellation coefficient.
Futureinternet 12 00175 g006
Figure 7. The D2D link rates under various cancellation coefficient.
Figure 7. The D2D link rates under various cancellation coefficient.
Futureinternet 12 00175 g007
Figure 8. The Optimal D2D link rate versus power of D1.
Figure 8. The Optimal D2D link rate versus power of D1.
Futureinternet 12 00175 g008
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParameterValue
Bandwidth5 Hz
Noise power−70 dBm
Path loss exponent2
The distance between CU and D1200 m
The distance between CU and D2200 m
The distance between D1 and D2200 m
The distance between D1 and BS300 m
Power of CU1 W
Power of D11 W
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Song, X.; Xia, L.; Xu, S.; Wang, Y. Secure Communication for Uplink Cellular Networks Assisted with Full-Duplex Device-to-Device User. Future Internet 2020, 12, 175. https://doi.org/10.3390/fi12100175

AMA Style

Song X, Xia L, Xu S, Wang Y. Secure Communication for Uplink Cellular Networks Assisted with Full-Duplex Device-to-Device User. Future Internet. 2020; 12(10):175. https://doi.org/10.3390/fi12100175

Chicago/Turabian Style

Song, Xin, Lin Xia, Siyang Xu, and Yue Wang. 2020. "Secure Communication for Uplink Cellular Networks Assisted with Full-Duplex Device-to-Device User" Future Internet 12, no. 10: 175. https://doi.org/10.3390/fi12100175

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop