You are on page 1of 11

This article has been accepted for publication in a future issue of this journal, but has not been

fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2017.2789022, IEEE
Transactions on Vehicular Technology

JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1

Optimization-based Access Assignment Scheme for


Physical-Layer Security in D2D Communications
Underlaying a Cellular Network
Lei Wang, Jiaming Liu, Mingkai Chen, Guan Gui, Senior Member, IEEE and Hikmet Sari, Fellow, IEEE

Abstract—In this paper, we consider physical-layer security growing demands for spectrum resources, and this situation
for device-to-device (D2D) communications underlaying cellular has motivated related efforts for heightening spectral efficiency
networks in which cellular users are under threat from multiple in cellular networks. Device-to-device (D2D) communication
eavesdroppers. We propose an access selection scheme for D2D
users to protect cellular users against eavesdropping. Specifically, [1], as an important complement to cellular networks, can
in our proposed scheme, multiple D2D users whose distance to enable effective reuse of spectrum resources and efficient data
the cellular user are more than the threshold we set will be transmission [2] by means of direct communication between
selected to share the same spectrum as that cellular user, and pairs of users. Thus, the question of how to combine D2D
the interference generated by the selected D2D users can be seen communication with traditional cellular networks to improve
as a jamming measure to interrupt the eavesdropping. Then, we
consider the secrecy throughput as a standard based on which to spectrum resource utilization and network capacity has be-
quantify the security performance of our proposed scheme, and come a hot topic of research in academia and industry [3]–[8].
we derive a closed-form expression for the secrecy throughput The core of D2D communication is that two communication
of a cellular user with the aid of stochastic geometry. Moreover, devices, called a D2D pair, communicate directly in close
by using the optimization method, we prove the existence of proximity through spectrum sharing, without imposing an
optimal threshold and design an iterative algorithm based on the
advance-and-retreat method to determine the optimal threshold. additional burden on the base station. However, such spectral
Simulation results show that our access selection scheme can reuse inevitably leads to problems such as interference. Thus,
effectively improve the physical-layer security of cellular users much of the literature on D2D communication [9]–[11] is
and that the maximum secrecy throughput can be achieved with devoted to reducing the side effects of D2D communication-
the optimal threshold. s in cellular networks through interference management or
Index Terms—Physical-layer security, D2D communication, suppression. In [12], the authors utilize a destination routing
Stochastic geometry, Access selection, Optimization method algorithm to design a multi-hop routing scheme for cyber-
physical systems to avoid interference among cellular users.
I. I NTRODUCTION In [13], the authors utilize a novel interference graph to model
the relationships between different D2D communication links.
As mobile communication enters the 5G era, the number of In these works, the interference generated by D2D users is
network users and the level of service demands are explosively considered to be a harmful phenomenon that will severely
growing. This high density of users and the accompanying disrupt cellular users and needs to be suppressed and isolated
network service requirements will inevitably place an increas- through various schemes.
ingly heavy burden on traditional cellular networks. In fact, However, this interference can also have a positive effect
the existing cellular network architecture cannot satisfy the in protecting cellular users from eavesdropping when we
Copyright (c) 2015 IEEE. Personal use of this material is permitted. consider the interference problem from the perspective of
However, permission to use this material for any other purposes must be physical-layer security. In the context of the physical layer
obtained from the IEEE by sending a request to pubs-permissions@ieee.org. [14], secure communication is ensured when the achievable
This work was partially supported by the National Natural Science Foun-
dation of China (61571240, 61671253), the Priority Academic Program rate between the signal source and the legitimate receiver
Development of Jiangsu Higher Education Institutions; the Natural Science is higher than that between the source and eavesdroppers.
Foundation of Jiangsu Province (BK20161517), the Open Research Fund of In particular, many recent works [15]–[18] have revealed
National Local Joint Engineering Research Center for Communication and
Network Technology, Nanjing University of Posts and Telecommunications that cooperative relaying is a reliable method of enhancing
(TXKY17005), the Open Research Fund of the State Key Laboratory of physical-layer security. In [19], the authors considered D2D
Integrated Service Networks, Xidian University (ISN17-04), and the Major communication in the context of physical-layer security for
Projects of the Natural Science Foundation of the Jiangsu Higher Education
Institutions (16KJA510004), Jiangsu Specially Appointed Professor Grant the first time, turning the interference induced by D2D pairs
(RK002STP16001), Innovation and Entrepreneurship of Jiangsu High-level into a jammer to intercept eavesdroppers and proposing an
Talent Grant (CZ0010617002), and ”1311 Talent Plan” of Nanjing University access scheme to limit the transmission power of D2D pairs. A
of Posts and Telecommunications.
The authors are with the National Engineering Research Center for Stackelberg-game-based power selection algorithm is proposed
Communication and Network Technology, Nanjing University of Posts and in [20] to enhance the security performance of D2D pairs
Telecommunications, Nanjing 21003, China (Emails: {wanglei, 1016010414, by improving the secrecy energy efficiency. In view of the
guiguan, hikmet}@njupt.edu.cn, mingkaichen1989@163.com).
L. Wang is also with The State Key Laboratory of Integrated Service cross-interference between a cellular user and a D2D pair,
Networks, Xidian University, Xi’an 710126, China. [21] studies the influence of resource allocation on security

0018-9545 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2017.2789022, IEEE
Transactions on Vehicular Technology

JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 2

capacity and derives a minimum achievable secrecy rate. In


[22] and [23], the authors study the energy consumption of
large-scale D2D communications in cellular networks. With
the design of a suitable link adaptation scheme, the D2D pairs
can adaptively adjust their own transmission power to strike a
desired balance in the trade-off between spectrum utilization
Ⱦ
and security protection efficiency. In [24], the authors study Ⱦ Set of D2D
BS
how to choose the appropriate D2D protection pair based on protection
pairs
channel gains in the case of a random distribution of D2D
pairs. Bob
Set of
Although many previous works have demonstrated the ad- ȾȾȾ
Eves
vantages of D2D in terms of security protection, few studies
have investigated how to select and control the access of Communication Interference
D2D pairs to maximize protection performance. Therefore, the link link
question of how to design a reasonable access scheme to select Eavesdropping D2D link
the appropriate D2D pairs to serve as protection pairs from link

among a large number of D2D pairs remains a sticking point in Fig. 1: A D2D communication system underlaying a cellular network with the reuse of
downlink resources.
efforts to ensure the physical security of D2D communications
underlaying a cellular network.
In this paper, we investigate physical-layer security for
The remainder of this paper is organized as follows. Section
D2D communications underlaying cellular networks in which
II presents the system model of the D2D-underlaid cellular
multiple D2D pairs share the spectrum with a cellular user
network, the access selection scheme and the definition of se-
who may be overheard by multiple eavesdroppers. We use
crecy throughput. The modeling process for random geometry
the interference generated by the D2D pairs to confuse the
is also described as part of the system modeling discussion.
eavesdroppers. We formulate this scenario as an optimization
Next, we derive the expression for the secrecy throughput
problem in which the objective is to maximize the achievable
by analyzing an eavesdropper’s probability of outage and the
secrecy throughput of cellular users. In addition, compared
coverage probability of the cellular user in Section III . Then,
with previous related works, we consider a more general
we analyze the optimal threshold for access selection scheme
scenario in which both the D2D pairs and the eavesdroppers
and design the relevant practical algorithms in Section IV,
are randomly distributed and multiple D2D pairs can simul-
followed by the presentation and analysis of numerical results
taneously share the spectrum with a given cellular user. The
in Section V. A conclusion is presented in Section VI.
main contributions of this paper are summarized as follows:
• We construct a new cellular network scenario in which II. P ROBLEM F ORMULATION
multiple D2D pairs can share the same spectrum as a
A. System model
single cellular user. Also, we assume that the positions
of the D2D pairs are random as well as those of the In this paper, we consider D2D communications underlay-
eavesdroppers. Unlike in [24], multiple eavesdroppers can ing a cellular network that consists of a base station (BS) lo-
collaboratively tap into legitimate transmissions from the cated in the present cell, a cellular user Bob who receives data
cellular user. from the BS, multiple D2D pairs with certain communication
• We propose a novel access selection scheme to control requirements, and multiple eavesdroppers (Eves). It is impor-
the interference generated by the D2D pairs and improve tant to note that only D2D pairs that are selected as protection
the secrecy throughput of the cellular user. Unlike in pairs can reuse the same spectrum as the cellular user; not
previous related works, in our proposed scheme, we select all D2D pairs share the spectrum with the cellular user. By
a subset of the D2D pairs as D2D protection pairs which sharing the spectrum, eavesdroppers can arbitrarily overhear
is permitted to share the spectrum with the cellular user and capture data transmissions from the BS to Bob, and
according to distance. We set a threshold µ to limit the we cannot obtain information on the eavesdroppers’ physical
distance between D2D protection pairs and the cellular locations or eavesdropping channels because the eavesdroppers
user, rather than limiting the power of the D2D pairs as are passive. In addition, every node in the cellular network is
in [19] or channel gains in [24]; thus, our scheme does equipped with a single antenna. The structure of the system
not affect the data transmission capabilities of the D2D is shown in Fig.1.
links. We apply both large-scale fading and small-scale fading
• We design an iterative algorithm based on the advance- for channels in the underlaying model. The large-scale fading
and-retreat method to determine the feasible optimal satisfies the standard path loss model
threshold for our scheme. Simulation results show that
l(r) = r−α , (1)
our scheme achieves a substantial improvement in terms
of secrecy throughput over the schemes presented in [19] where r represents the distance and α > 2 [25] is the path
and [24]. loss factor. In addition, we assume that the small-scale fading

0018-9545 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2017.2789022, IEEE
Transactions on Vehicular Technology

JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 3

TABLE I:
LIST OF KEY NOTATIONS AND VARIABLES USED IN THIS PAPER R2 and consider densities of λD and λE , respectively. We
denote the positions of all D2D pairs, the D2D protection pairs
Symbol Meaning
and the eavesdroppers by ΦD , ΦsD and ΦE , respectively. In
α Path loss factor this paper, the two-dimensional space considered is simply the
ΦD Set of D2D pairs circular area R2 covered by a cellular network with radius R.
ΦSD Set of selected D2D protection pairs The notations used in this paper are summarized in Table I.
ΦE Set of eavesdroppers
Average transmission power of the D2D
PD
pairs B. SINR model
PB Transmission power of the BS
Rt Transmission rate of the cellular user The channel model used in this paper satisfies the following
Rs Secrecy rate of the cellular user expression:
Interference received at Bob generated by Pr = Pt · h · r−α , (2)
D
IB
the D2D protection pairs where Pt is the transmission power of the transmitter; Pr is
D Interference received at the jth Eve gener- the received power at the receiver; h ∼ exp(1) is the channel
IEj ated by the D2D protection pairs gain, which follows an i.i.d Rayleigh fading process; and α is
Ts Secrecy throughput the fading exponent.
Connection success probability of the cel- D
In the cellular network, Bob receives interference IB from
Pcs
lular user the co-channel D2D protection pairs, while the Eves also
Po Outage probability of the eavesdroppers receive interference IED
from the co-channel D2D protection
SINR threshold for outage for the eaves- pairs.
δC
droppers The interference affecting Bob can be expressed as
SINR threshold for connection success for
δE db −α
X
D
the cellular user IB = PD (hdb
i )(ri ) , (3)
rBb Distance between the BS and Bob i∈ΦS
D

Distance between the ith D2D pair D2Di where PD is the transmission power of the D2D protection
ridb
and Bob pairs and hdb and ridb are the channel gain and distance,
i
de Distance between the ith D2D pair D2Di respectively, between D2Di and Bob.
rij
and the jth Eve Evej The interference affecting the jth Eve can be expressed as
Channel gain between the ith D2D pair
hdb D
X
de −α
i D2Di and Bob IEj
= PD (hde
ij )(rij ) , (4)
Channel gain between the ith D2D pair i∈ΦS
hde
ij
D
D2Di and the jth Eve Evej
where hde de
ij and rij are the channel gain and distance, re-
No Power of AWGN noise
spectively, between D2Di and Evej . Thus, we can determine
the received signal-to-interference-plus-noise ratios (SINRs) at
Bob and the Eves.
is an independent quasi-static Rayleigh fading phenomenon The received SINR at Bob can be expressed as
whose channel gains follow an exponential distribution with a −α
parameter of 1, as in [26]. PB hBb (rBb )
SIN RB = D +N
In the cellular network, relative to the single fixed cellular IB 0
user, the distribution of the multiple D2D pairs is random,
and their locations are difficult to acquire. At the same time, −α
(5)
PB hBb (rBb )
the Eves passively work to maintain the eavesdropper state. = P −α ,
In this case, it is difficult for the traditional physical model to PD (hdb db
i )(ri ) + N0
i∈ΦS
describe the distribution characteristics of the eavesdroppers D

and D2D pairs in the current cell. where PB is the transmission power of the BS; hBb and rBb
Fortunately, a stochastic geometric model can well represent are the channel gain and distance, respectively, between the
the statistical properties of these random distributions without BS and Bob; and N0 is the noise power.
knowledge of the exact locations. In related research on the The received SINR at Evej can be expressed as
application of stochastic geometric tools in wireless networks, −α
such as [27] and [28], such random distributions are usually PB hBe Be
j (rj )
SIN REj = D
described by means of Poisson point processes (PPPs), and IEj + N0
the statistical properties of such a distribution are described
by quantitative features such as expectation and density, which (6)
−α
are also widely adopted in research on physical-layer security PB hBe Be
j (rj )
= P −α ,
[29], [30]. Therefore, we model the positions of the D2D pairs PD (hde de
ij )(rij ) + N0
and the Eves using two independent homogeneous PPPs on i∈ΦS
D

0018-9545 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2017.2789022, IEEE
Transactions on Vehicular Technology

JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 4

where hBej and rj


Be
are the channel gain and distance, respec- protected well. In our scheme, we select the D2D protection
tively, between the BS and Evej . pairs from all potential D2D pairs according to the distance
between the D2D pair and Bob ridb . In particular, multiple
C. Secure throughput D2D pairs whose ridb are more than a fixed threshold we
set will be selected to serve as D2D protection pairs and
Here, we use the secure throughput Ts to study the feasi- share the spectrum with Bob. With such access selection
ble secrecy performance of our scheme through a combined scheme, D2D protection pairs can shelter the cellular user’s
analysis of cellular users and eavesdroppers. In accordance transmission by maximizing the difference in receiving perfor-
with Wyner’s encoding scheme [31], [32], we denote the mance between the cellular user and the eavesdroppers. This
secrecy rate by Rs and the transmission rate by Rt . Bob can not only protects the security of the cellular user from the
successfully decode the received signal only if the capacity of perspective of physical-layer security but also enhances the
the channel is higher than the transmission rate. This condition spectral efficiency of the cellular network.
can be expressed as Here, distance between D2D protection pairs and Bob
log2 (1 + SIN RB ) > Rt . (7) should be in the following set:

The probability of this condition is called the connection ΦSD = {ridb |µ ≤ ridb ≤ R+rBb andi ∈ ΦD }, (11)
success probability, denoted by Pcs . where µ is the selection threshold for D2D protection pairs,
Meanwhile, a secrecy outage will occur under the condition R+rBb is the maximum of ridb in the cell.
that the capacity of Alice communicating to multiple Eves is By treating the access threshold µ as the main variable of
higher than the redundancy rate [33], [34]. This condition can interest, the problem of maximizing the secrecy throughput Ts
similarly be expressed as can be reformulated as
log2 (1 + SIN RE ) > Rt − Rs . (8) max Ts
µ 
The probability of this condition is called the secrecy outage  µ ≤ R+rBb . (12)
probability, denoted by Po . s.t. log2 (1 + SIN RB ) > Rt
log2 (1 + SIN RE ) > Rt − Rs

Therefore, the secrecy throughput (Ts ) can be defined as
Ts = Rs Pcs (1−Po ). (9) By solving this optimization problem, we can determine the
optimal threshold µ that maximizes the security performance
By adjusting the number of selected D2D protection pairs, of our scheme. Simultaneously, to simplify the optimization
the achievable secrecy throughput can be maximized. We problem, we need to analyze the connection success proba-
formulate this optimization problem as follows: bility of the cellular user and the outage probability of the
max Ts eavesdroppers to derive a suitable expression for Ts .
.

log2 (1 + SIN RB ) > Rt (10)
s.t.
log2 (1 + SIN RE ) > Rt − Rs B. Connection success probability of the cellular user
In this subsection, we analyze the connection success prob-
III. ACCESS S ELECTION S CHEME ability of the cellular user.
In this section, we propose an access selection scheme for In the access assignment scheme, when the selected D2D
selecting the appropriate D2D pairs as protection pairs such protection pairs share the spectrum with Bob, the interference
D
that the communication security of the cellular user to be IB received by Bob will grow and affect the capacity of
protected is maximized. Then, we derive the outage probability the channel between the BS and Bob. In accordance with
of the eavesdroppers and the connection success probability of (7), to ensure connection success for Bob, we should set the
the cellular user. threshold for SIN RB appropriately to limit the number of
D2D protection pairs.
For a cellular user, we denote the SINR threshold for
A. Acess threshold
connection success by δC , which satisfies
When reusing spectrum resources, D2D pairs will inevitably
induce same-frequency interference. This interference will log2 (1 + δc )=Rt , (13)
affect the communication quality of both cellular users and where δC is the minimum SIN RB that can satisfy the
eavesdroppers. When sharing the spectrum with a cellular requirement on the transmission rate Rt and ensure that Bob
user, the D2D pairs which are far from the cellular user may can successfully decode the received signals.
not be sufficient to effectively interfere with eavesdropping, Then, we can use δC to express Pcs as follows:
whereas the D2D pairs which are close to the cellular user
can cause excessive interference and thus inhibit the cellular Pcs = P rob(SIN RB ≥ δC ). (14)
user’s normal communication.
By combining (14) and (15), we can obtain the following
Therefore, it is necessary to select an appropriate distance
relationship between δC and the transmission rate Rt :
between D2D protection pairs and the cellular user to ensure
that the communication security of the cellular user will be δC =2Rt −1. (15)

0018-9545 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2017.2789022, IEEE
Transactions on Vehicular Technology

JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 5

Hence, using the definition of SIN RB given in (5), we C. Outage probability of the eavesdroppers
obtain the following expression for the connection success
probability of the cellular user in the access assignment
This subsection analyzes the outage probability of the access
scheme:
assignment scheme. Similarly to (14), we denote the SINR
Pcs = P rob (SIN RB ≥ δC ) threshold for connection outage by δE , which satisfies
 −α 
PB (hBb )(r Bb )
= P rob D +N ≥ δC
 IB 0
D
 log2 (1 + δE )=Rt − Rs , (21)
δ (N0 +IB )
= P rob hBb ≥ PC (rBb ) −α
B
α where δE is the maximum SIN RE that satisfies the require-
δ (r Bb ) (N0 +IBD
 
)
= EIBD exp − C PB ment on the secrecy rate Rs .
Bb α α
δ (r Bb ) I D
   
= exp − δC (rPB) N0 EIBD exp(− C PB B ) , Then, we can use δE to express Po as
α D 
(16) Po = P rob(SIN RE ≥ δE ). (22)
δC (r Bb ) IB

where EIBD exp(− PB ) is difficult to simplify by
the general way. Here, we use Laplace transform to solve this By combining (21) and (22), we can obtain the relationship
problem. According to [25], we have between δE and the transmission rate Rt − Rs as follows:

LIBD (s) = EIBD exp(−sIB D



) , (17) δE =2Rb −Rs − 1. (23)

where LIBD (s) is defined as the Laplace transform of interfer- Hence, using the definition of SIN RE given in (6), we ob-
D
ence IB evaluated at s. tain the outage probability of the Eves in the access assignment
Bb −α scheme as follows:
Therefore, when set s = δC (r PB) PD , we can turn
α Po = P rob(SIN RE ≥ δE )
δ (r Bb ) I D
 
D
EIBD exp(− C PB B ) into EIBD exp(−sIB ) which is = 1 − P rob (SIN RE ≤ δE )
easier to simplify. Be −α
PB (hBe
 P 
j )(rj )
D db α
PD (hdb
P
Since IB = i )(ri ) , we can have
 j∈ΦE
= 1 − P rob  ≤ δE 

i∈ΦS D +N )
(IE
D
j 0
D

LIBD (s)=EIBD exp(−sIB ) 
−α

−α PB (hBe )(rjBe )
exp(−shdb (ridb ) ))
Q Y j
= E( =1−E (P rob( ≤ δE ))
(I D +N )
i∈ΦS
D E 0
R R+rBb j∈Φ E j
db db −α
= exp(− µ Eh (1 − e−sh (ri ) )λD dridb ) = 1 − exp{−λE π
= exp( λα−1

((R+rBb )−(α−1) − µ−(α−1) ) Be −α
!
PB hBe
j (rj )
Z
2
2
· Γ(1 + α )Γ(1 − α2 )s α ). · (1 − P rob D +N
≥ δE dσEj )},
(18) R2 IE j 0
The proof of (17) and (18) is shown in Appendix A. (24)
Bb α
where σEj is the position of Evej and the function given in
By substituting s = δC (r PB) PD
into (18), we can obtain (24) is a complex two-dimensional integral associated with the
the following result for LIbD (s) eavesdroppers’ location information.
 Bb −α
 To simplify, we first calculate the value of the accumulated
LIBD δC (r PB) PD
function as follows:
= exp{ λα−1

[(R+rBb )−(α−1) − µ−(α−1) ] (19) −α !
2 2 2
δC PD α Bb 2 PB (hBe )(rjBe )
· (1 + α )Γ(1 − α )( PB ) (r ) }, P rob ≥ δE
D +N )
(IE
R +∞ j 0
where Γ(x) = 0 tx−1 e−t dt is the gamma function. Note 
de −
α
Be α

) (hde
P
δE [N0 + PD (rij ij )](rj )
that each instance of the gamma function in the above expres-  Be i∈ΦS 
D
sion depends on the path loss factor α. = P rob h ≥

PB 
Then, by substituting (19) into (16), we obtain
 α −α 
δE (rjBe ) [N0 + PD de
(hde
P
(rij ) ij )]
Bb α
 i∈ΦS
D

Pcs = exp{− δC (rPB) N0 + λα−1 Dπ
[(R+rBb )−(α−1) − µ−(α−1) ] = EIEDj exp(− )

PA 
· Γ(1 + α2 )Γ(1 − α2 )( δCPPBD )2/α (rBb )2 },
(20) α ! α !
δE (rjBe ) N0 δE (rjBe ) PD
which provides a closed-form expression for the connection = exp − LIED ,
success probability of the cellular user in the presence of PB j PB
interference from the D2D protection pairs. It can be observed (25)
D
from (20) that the connection success probability depends only where LIEDj (s) is the Laplace transform of IEj . Specifically, it
on µ. is a two-dimensional Laplace transform in the two-dimensional

0018-9545 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2017.2789022, IEEE
Transactions on Vehicular Technology

JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 6

area of the cell, which is expressed as follows: Although we have the closed-form secrecy throughput ex-
! pression presented in the previous section, we cannot directly
de de −α determine the optimal threshold for maximizing the physical-
Q
LIED (s) = E exp(−shij (rij ) )
j
i∈ΦS
D
layer security protection for cellular users. Here, we analyze
de −α
 R de

= exp − R2 Eh [1 − eshij (rij ) ]λSD dσ the security throughput and prove that it is a quasi-concave
2 function. Then, we design an iterative algorithm based on the
= exp[−λD π(R−α − µ−α )Γ(1 + α2 )Γ(1 − α2 )s α ], advance-and-retreat method to obtain the optimal threshold.
(26)
where s is the Laplace transform α
of SIN RE .
δE (rjBe ) PD
By substituting s = PB into (26), we can obtain
the following result for the Laplace transform: A. Secrecy Throughput Analysis
−α
δE (rjBe ) PD
LIED [ PB ]
j According to the previous analysis, we find that there is an
= exp(−λD π(R − µ−α )Γ(1 + α2 )
−α (27)
2
optimal threshold µo that can help us to achieve the optimal
· Γ(1 − α2 )( δEPPBD ) α ), secrecy throughput, that is, the optimal trade-off between the
beneficial interference received by the Eves and the harmful
where rjBe it is an uncertain value due to the random distri-
interference received by Bob. Before deriving the optimal
bution of the Eves and we have obtained its expectation value
threshold, we must first prove that the secrecy throughput Ts
by means of the Laplace transform.
is a quasi-concave function of the threshold µ. The quasi-
By combining (25) and (27), we can obtain the correspond-
concavity of the secrecy throughput is given by Theorem 1:
ing expression for the integral function as follows:
 −α
 Theorem 1: Ts is a quasi-concave function with respect to
PB (hBe )(rjBe ) µ.
P rob D
(IE +N0 )
≥ δE
j
δE N0 (28) Proof: To simplify the expressions, we use the parameters
= exp{− − λ π(R−α − µ−α ) D
PB
2
a and b to rewrite the connection success probability of
· Γ(1 + α2 )Γ(1 − α2 )( δEPPBD ) α }. the cellular user (Pcs ) and the outage probability of the
Finally, by substituting (28) into (24), we obtain eavesdroppers (Po ), respectively.
Here, we define
Po =
λE
1 − exp(− δ 2 )
E N0 2
+λD π(R−α −µ−α )Γ(1+ α 2
)Γ(1− α )(
δE PD
)α Bb α
PB
(29)
PB
a = − δC (rPB) N0 + λα−1

[(R+rBb )−(α−1) − µ−(α−1) ]
α
which provides a closed-form expression for the outage prob- · Γ(1 + α )Γ(1 − α )( δCPPBD ) 2 (rBb )2 ,
2 2

ability of the Eves in the presence of interference from the (32)


D2D protection pairs. It can be observed from (29) that the
outage probability depends only on the threshold µ, similar to b=
the case of the connection success probability. −δ λE
2 , (33)
E N0 2
+λD π(R−α −µ−α )Γ(1+ α 2 δE P D

After completing the analysis of both the connection success PB )Γ(1− α )( PB

probability and the outage probability, using the definition where both a and b are functions of the variable µ, and we
given in (9), we can obtain a complete expression for the can rewrite the Pcs and Po as
secrecy throughput Ts , as shown in (30). This expression will
help us to investigate the optimal threshold on the number of Pcs = exp(a), (34)
D2D protection pairs for maximizing the secrecy throughput.
Po = 1 − exp(b). (35)
IV. S ECRECY T HROUGHPUT A NALYSIS AND We can also obtain the first-order partial derivatives of a and
O PTIMIZATION b as follows:
In this section, we present the secrecy throughput analysis ∂a 2 2 δC PD α Bb 2
and optimization method for the access assignment scheme. = λD πµ−α Γ(1 + )Γ(1 − )( ) 2 (r ) , (36)
∂µ α α PB

Ts = Rs · Pcs · (1−Po )
Bb α 2
=Rs · exp[− δC (rPB) N0 − λD π Bb −(α−1)
α−1 ((R+r ) − µ−(α−1) )Γ(1 + α2 )Γ(1 − α2 )( δCPPBD ) α (rBb )2 ]
λE
· exp[− δ N 2 ]
E 0 +λ π(R−α −µ−α )Γ(1+ 2 )Γ(1− 2 )( δE D P

PB D α α PB
α
δC (r Bb ) N0 λD π 2
(30)
=Rs · exp[− PB − Bb −(α−1)
α−1 ((R+r ) − µ−(α−1) )Γ(1 + α2 )Γ(1 − α2 )( δCPPBD ) α (rBb )2 ]
λE
− δ N δE PD
2
E 0 2 2
PB +λD π(R−α −µ−α )Γ(1+ α )Γ(1− α )( PB )α

0018-9545 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2017.2789022, IEEE
Transactions on Vehicular Technology

JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 7

2 2
∂ a ∂ b
Here, we can find that ∂n 2 + ∂n2 ≤ 0 when µ satisfies
∂(a+b)
∂b
= ∂µ = 0. Therefore, (a + b) is a quasi-concave function of
∂n
λE λD παµ−(α+1) Γ(1+ α
2 2 δE PD
2

µ and Ts is also a quasi-concave function of µ, from which
)Γ(1− α )( PB . (37)
δ N0 δ PD
2 2 Theorem 1 can be derived.
2 2
( E
PB +λD π(R−α −µ−α )Γ(1+ α )Γ(1− α )( E
PB )α )

Since Ts = Rs Pcs (1−Po ), we have B. Optimal threshold for D2D pairs


Ts = Rs exp(a + b), (38) Since the secrecy throughput Ts is a quasi-concave function
where (a + b) depends only on µ. with respect to the threshold µ, we can design an iterative al-
gorithm based on the advance-and-retreat method, an efficient
Thus, Ts is a quasi-concave function with respect to µ if
method of optimization, to locate the optimal threshold µo .
and only if (a + b) is a quasi-concave function with respect
Here, we define the search direction dk and the search step
to µ.
ζ. The search step is defined as follows:
We can prove the quasi-concavity of Ts by using the conclu-
sion presented in [35], i.e., f (x) is a quasi-concave function xk+1 = xk + ζ, (44)
on R2 if and only if ∂f (x)/∂x = 0 ⇒ ∂ 2 f (x)/∂x2 ≤ 0.
where xk represent the kth search point and the search
By combining (34) and (35), we find that when ∂(a+b)
∂µ = 0, direction dk is from 0 to R + rBb .
the following holds:
Considering that all search points are continuous, we can
2
λE λD παµ−(α+1) Γ(1+ α
2 2
)Γ(1− α )(
δE PD
PB )α use xk to represent the distance between D2D protection pairs
δE N0 2 2 D α ) δ P
2 2
(39) and Bob.
( PB +λD π(R−α −µ−α )Γ(1+ α )Γ(1− α )( E
PB )
−α 2 2 δC PD α When Ts (xk ) satisfies
= λD πµ Γ(1 + α )Γ(1 − α )( PB ) 2 (rBb )2 .
Ts (xk ) ≥ Ts (xk−1 ) (45)
When µ satisfies (36), we can obtain the expression for
∂ 2 (a+b)
∂µ2 in (39) at the bottom of the page. Since the expression and
for ∂ 2 (a+b)
is too long, we divide (39) into T1 , T2 and T2 and Ts (xk ) ≥ Ts (xk+1 ), (46)
∂µ2
rewrite the (39) as follows: we can obtain the optimal secrecy throughput, and the corre-
sponding value of xk is the optimal value for the threshold µ.
∂ 2 (a + b) The specific process is shown in Algorithm 1.
= −(T1 +T2 +T3 ), (40)
∂µ2
where V. S IMULATION R ESULTS AND D ISCUSSION
−(α+1) 2 2 δC P D 2
T1 = αλD πµ Γ(1 + )Γ(1 − )( )α , (41) In this section, several representative simulation results are
α α PB
presented to provide more insight into the theoretical analysis.
We assume that the D2D pairs and eavesdroppers are randomly
T2 = distributed in a cell region of radius R = 100 m. We set PB =
2
δE PD
λE λD πα(α+1)µ−(α+2) Γ(1+ α
2 2
)Γ(1− α )( PB )α , (42) 20 dBm and set the noise power at all nodes to −50 dBm.
4
δ N0
( E 2
+λD π(R−α −µ−α )Γ(1+ α 2
)Γ(1− α
δ PD
)( E
2
)α )
The transmission rate is Rt = 5 bps/Hz, and the secrecy rate
PB PB
is Rs = 4 bps/Hz. Additionally, the path loss factor α is set
and to 3 unless otherwise stated.
T3 = Fig. 2 shows the outage probability of the eavesdroppers
4
λE λD 2 π 2 αµ−2(α+1) Γ2 (1+ α
2
)Γ2 (1− α
2
)(
δE P D
PB )α (43) versus the threshold µ that is used in the proposed scheme
δ N0 2 2 δ PD
2 4 for different eavesdropper densities λE . From Fig. 2, we can
( E +λD π(R−α −µ−α )Γ(1+ α )Γ(1− α )( E )α )
PB PB
see that as the threshold µ grows, the eavesdroppers’ outage
is positive. probability Po is always decreasing and tends toward 0 for

∂ 2 (a+b)
∂µ2
2
2
−(α+1) 2 2 δC PD α λE λD πα(α + 1)µ−(α+2) Γ(1 + α2 )Γ(1 − α2 )( δEPPBD ) α
= − αλD πµ Γ(1 + )Γ(1 − )( ) − 2 4
α α PB
| {z } ( δEPN0 + λD π(R−α − µ−α )Γ(1 + α2 )Γ(1 − α2 )( δEPPD ) α )
B B
T1
(39)
| {z }
T2
4
2 2 −2(α+1) 2 2 2 2 δE PD α
λE λD π αµ Γ (1 + α )Γ (1 − α )( PB )
− 2 4
( δEPN0 + λD π(R−α − µ−α )Γ(1 + 2
α )Γ(1 − 2 δE PD α
α )( PB ) )
| B {z }
T3

0018-9545 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2017.2789022, IEEE
Transactions on Vehicular Technology

JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 8

Algorithm 1 Iterative algorithm for threshold optimization 1


based on the advance-and-retreat method
0.9
Initialize the SINR threshold δC ,δE , the density of eaves-

Outage probability of eavesdroppers


0.8
droppers λE , rBb PB , PD , m and α . Theoretical(λE =0.001)

0.7 Theoretical(λE =0.002)


for k = 1; k < m; k + + do Theoretical(λE =0.003)
0.6
ζ = 0.01 Simulation(λE =0.001)
Simulation(λE =0.002)
xk = k · ζ 0.5
Simulation(λE =0.003)
xk+1 = xk + ζ 0.4

if Ts (xk+1 ) < Ts (xk ) then 0.3

Ts = Ts (xk+1 ) 0.2

else 0.1
k0 = k 0
Ts = Ts (xk ) 10 20 30 40 50 60 70 80 90 100 110
Threshold µ (m)
return k0 , Ts
Fig. 2: The outage probability Po of the Eves versus the threshold µ for different λE
end if values, where PD = 10 dBm.
end for
for k = k0 + 1; k ≤ m; k + + do
xk = k 0 · ζ 1.8

xk+1 = k 1.6
Theoretical(λ =0.002)
E
Theoretical(λE =0.004)
if Ts (xk+1 ) > Ts (xk ) then Theoretical(λE =0.006)

Secrecy Throughput T s (bps/Hz)


1.4
k0 + + Simulation(λE =0.002)

1.2 Simulation(λE =0.004)


else Simulation(λ =0.006)
E
if k == m then 1 Simulation optimization
0 Theoretical optimization
µo = k0 0.8
Ts = Ts (x0 ) 0.6
return n, Ts
0.4
end if
end if 0.2

end for 0
20 30 40 50 60 70 80 90 100 110
Threshold µ (m)

Fig. 3: The secrecy throughput of the cellular user versus the threshold µ for different
three different values of λE . This means that the D2D protec- λE values, where Rt = 5 bps/Hz, Rs = 4 bps/Hz, PD = 10 dBm and
λD = 0.001.
tion pairs we select can effectively suppress and interrupt the
eavesdropping links for different densities of eavesdroppers.
At the same time, the eavesdropper density λE also affects
the rate of increase of the outage probability. To achieve the initially shows an obvious improvement. After this growth, the
same outage probability Po with a higher eavesdropper den- secrecy throughput reaches a peak and then rapidly decreases.
sity, a smaller µ are required. Moreover, although increasing This proves the Theorem 1 that Ts is a quasi-concave function
the threshold µ can significantly reduce the eavesdropper’s of µ and there exists an optimal threshold µo can maximize
probability of interruption, the efficiency of this improvement the security performance of cellular users. Additionally, in
can be divided into two periods. In the first period, when the Fig.3, we also mark the position of optimal threshold µo where
threshold µ is small, the outage probability decreases slowly. secrecy throughput achieves maximum. We can observe that,
In the second period, the decline of the outage probability the position of optimal threshold µo obtained by Algorithm
becomes rapid, and the outage probability approaches to 0. 1 matches well with that obtained through simulation. This
This phenomenon can be explained by the fact that the outage verified that our proposed iterative algorithm can help us to
probability of the eavesdroppers is not linearly related to the find the optimal threshold µo effectively.
distance between D2D protection pairs and Bob. In other Fig. 4 shows the optimal threshold µo versus the eaves-
words, when the distance threshold µ is more than a certain dropper density λE for different values of the transmission
value, their inhibitory effect on the eavesdroppers will become power PD of the D2D pairs. It can be seen from Fig. 4 that
exceptionally weak, below which increasing the threshold µ the values of µo calculated by Algorithm 1 agree well with
will not reduce the outage probability obviously. those obtained through simulation. We also observe that as the
Fig. 3 shows the secrecy throughput versus the threshold µ density of eavesdroppers increases, the optimal threshold µo
used in our proposed scheme for different eavesdropper densi- simultaneously decreases. This can be explained by the fact
ties λE . As shown in Fig.3, the theoretical secrecy throughput that more beneficial interference from D2D protection pairs is
calculated using (30) agree well with those obtained through required to ensure the deterioration of eavesdropping channels
simulation under different λE conditions, which further ver- as λE increases. Fig. 4 also shows that the transmission power
ifies our analysis of the secrecy throughput. Moreover, we of the D2D pairs markedly affects the value of the optimal
find that as the threshold µ increases, the secrecy throughput threshold µo . A higher transmission power of the D2D pairs

0018-9545 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2017.2789022, IEEE
Transactions on Vehicular Technology

JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 9

90 adopted in [19]. Moreover, as PD increases, the performance


of the joint-guard-zone-based access control scheme is always
80
lower than that of our scheme, and the disparity continues
to grow. This shows that the guard-zone-based access control
Optimal threshold µ o (m)

70
scheme presented in [24], in which the channel gains are used
60 as the selection criteria, cannot effectively limit the distance
50
ridb as well as the amount of interference caused by the D2D
Algorithm 1(P =12dBm)
D
Algorithm 1(PD=10dBm)
pairs, which will adversely affect the data transmission of
40 Algorithm 1(PD=8dBm) the cellular user they are intended to protect. By contrast,
Simulation(P =12dBm)
D
Simulation(P =10dBm)
our scheme can effectively select the D2D protection pairs
30
according to ridb and limit this harmful interference, thereby
D
Simulation(P =8dBm)
D

20 improving the secrecy performance.


2 3 4 5 6 7 8 9 10
Density of Eves λE /m 2 × 10-3

Fig. 4: The optimal threshold µo versus the density of Eves λE for different PD VI. C ONCLUSION
values, where λD = 0.001 and r Bb = 10 m.
In this paper, we discuss physical-layer security in a D2D-
underlaid cellular network from the perspective of protecting
2 a cellular user’s communication security. We select multiple
1.8 The proposed access selection scheme D2D pairs to serve as protection pairs by sharing the same
Secrecy-based access control scheme
1.6 Guard zone based access control scheme spectrum as the cellular user to be protected in order to resist
1.4
eavesdroppers. First, we select the D2D protection pairs from
all D2D pairs according to the distance between the D2D
Secrecy Throughput T s

1.2
pairs and the cellular user. Then, we set a threshold for the
1
distance in order to amplify the performance of our scheme
0.8
in terms of throughput. With the help of an optimization
0.6
method and stochastic geometry, we derive the expression
0.4 of throughput in our scheme and design a one-dimensional
0.2 search algorithm to determine the feasible optimal threshold
0 which can maximize the secrecy throughput of the cellular
-10 -8 -6 -4 -2 0 2 4 6 8 10
P D(dBm) user. On this basis, an access selection scheme for D2D users
is proposed that achieves the optimal physical-layer security
Fig. 5: Performance comparison of different schemes, where λE = 0.001,
λD = 0.001, PD = 10 dBm and r Bb = 10 m. performance for D2D communications underlaying cellular
networks. Simulation results show that the proposed access
selection scheme can effectively intercept eavesdroppers and
will lead to a larger threshold µ0 . This phenomenon can be enhance the communication security of cellular users by means
explained by the fact that the higher transmission power of of an optimal threshold.
the D2D pairs can amplify the interference effect generated by It is necessary to note that the case investigated in this paper
the D2D protection pairs and we need to expand the distance is a simple one in which only a single cellular user is protected
between D2D protection pairs and Bob in order to limit the by multiple D2D protection pairs in the presence of multiple
interference. eavesdroppers. It would be interesting to study a more general
In Fig. 5, we plot the secrecy throughput versus the trans- case in which multiple cellular users require physical-layer
mission power of the D2D protection pairs for our scheme security protection under threat from multiple eavesdroppers.
as well as the secrecy-based access control scheme presented In contrast to a single cellular user, multiple cellular users will
in [19] and the joint-guard-zone-based access control scheme use multiple independent spectra, and thus, a more flexible
presented in [24]. The threshold used in our proposed scheme access strategy will be required to coordinate the conflicting
is the threshold µo obtained by Algorithm 1. As shown in Fig. security requirements for different cellular users. This problem
5, as the D2D protection pairs’ transmission power increases, will be explored in our future work.
the three schemes show considerably different performance
in terms of the secrecy throughput. Specifically, the secrecy- A PPENDIX A
based access control scheme performs the worst, and our pro- P ROOF OF THE T WO -D IMENSIONAL L APLACE T RANSFORM
posed scheme is better than the others. One can observe from
To prove the result for the Laplace transform given in (18),
Fig. 5 that as PD increases, the secrecy throughputs of our
we derive the general expression for a Laplace functional. A
scheme and the joint-guard-zone-based access control scheme D
set IB that follows one or more PPPs can be described as a
are significantly enhanced, whereas that of the opportunistic
set of points in a certain area A of the cell of interest. We
jammer selection scheme improves relatively slowly. This
use the intensity measure Λ to represent the average number
indicates that the multiple D2D protection pairs adopted in our D
of points in IB ; it is defined as
scheme and the joint-guard-zone-based access control scheme
enable much better security performance than the single one Λ(A)= ID
B (A), (A.1)

0018-9545 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2017.2789022, IEEE
Transactions on Vehicular Technology

JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 10

where ID D
B (A) denotes the number of points in IB . Then, in (19) as follows:
D
we can define the 2-dimensional Laplace functional of IB as Y
de −α
follows: LIED (s) = E[ exp(−shde
ij (rij ) )]
R D j
LIBD = E[e R2 f (x)Ib (dx) ] i∈ΦS
D
P
− x∈I D f (x)
, (A.2) Z
de de −α
= E[e b ] = exp{− Eh [1 − eshij (rij ) ]λSD dσ} (A.10)
R2
D
where f is a function on A. In the case that all points in IB 2 2 2
= exp[−λSD πΓ(1 + )Γ(1 − )s α ].
satisfy PPPs, α αc
Z
LIBD = exp(− (1 − e−f (x) )Λ(dx)). (A.3)
R2

R EFERENCES
D
Since IB is the interference set, we can express the total [1] A. Asadi, Q. Wang, V. Mancuso ”A Survey on Device-to-Device
interference power measured at a point x in the cell as follows: Communication in Cellular Networks,” IEEE Communications Surveys
X & Tutorials, vol. 16, no. 4, pp. 1801-1819, Apr. 2014.
I(x) = l(kx − Y k), (A.4) [2] Liu J, Kato N, Ma J, et al,” Device-to-Device Communication in LTE-
Advanced Networks: A Survey,” IEEE Communications Surveys &
Y ∈ΦS
D Tutorials, 2017, 17(4):1923-1940.
[3] X. Lin, J. G Andrews, A. Ghosh, ”An overview of 3GPP device-to-
where Y represents the position of the transmitter in each of device proximity services,” IEEE Communication Magazine, vol.52, no.
the D2D protection pairs. Here, we consider the interference 4, pp. 40- 48, Apr. 2014.
as a shot noise process and calculate the Laplace transform of [4] L. Zhou, ”Mobile Device-to-Device Video Distribution: Theory and
Application,” ACM Transactions on Multimedia Computing, Commu-
the interference as follows: nications and Applications, vol. 12, no.3, pp. 1253-1271, 2015.
LI (s) = E[e−sI ] [5] R. Yin, C. Zhong, G. Yu, et al, ”Joint Spectrum and Power Alloca-
Y tion for D2D Communications Underlaying Cellular Networks,” IEEE
= E[ exp(−sl(r))]. (A.5) Transactions on Vehicular Technology, 2016, 65(4):2182-2195.
[6] D. Wu , L. Zhou , Y. Cai, ”Social-Aware Rate Based Content Sharing
r∈ΦS
D Mode Selection for D2D Content Sharing Scenarios,” IEEE Transactions
on Multimedia, 2017, PP(99):1-1.
[7] Tang F, Fadlullah Z M, Kato N, et al,”AC-POCA: Anti-Coordination
To account for the fading terms, we can assert that the Game based Partially Overlapping Channels Assignment in Combined
interference satisfies i.i.d. fading h as follows: UAV and D2D based Networks,”IEEE Transactions on Vehicular Tech-
nology, 2017, PP(99):1-1.
l(rdb ) = hd b(rdb )−α . (A.6) [8] Wu D, Zhou L, Cai Y, et al,” The role of mobility for D2D commu-
nications in LTE-advanced networks: energy vs. bandwidth efficiency,”
Wireless Communications IEEE,2014, 21(2):66-71.
[9] F. Malandrino, Z. Limani, C. Casetti, et al, ”Interference-Aware Down-
Since fading is defined as an independent point process, we link and Uplink Resource Allocation in HetNets With D2D Support,”
can simplify (A.3) by moving the expectation value of hd b IEEE Transactions on Wireless Communications, 2015, 14(5):2729-
inside the product. Thus, we can transform (A.3) as follows: 2741.
[10] X. Liu, Y. Li, X. Li, et al, ”Pilot Reuse and Interference-Aided MMSE
γ
Detection for D2D Underlay Massive MIMO,” IEEE Transactions on
LIBD (s) = exp(−λSD cd E[(hdb )γ Γ(1 − γ)s ], (A.7) Vehicular Technology, 2017, 66(4):3116-3130.
[11] L. Ferdouse, W. Ejaz, K. Raahemifar, et al, ”Interference and throughput
where γ = αd . We find that the expression above is valid aware resource allocation for multi-class D2D in 5G networks,” IET
only in the case of γ < 1. Thus, we can draw the following Communications, 2017, 11(8):1241-1250.
conclusions: [12] C. Ma, J. Liu, X. Tian, et al, ”Interference Exploitation in D2D-
Enabled Cellular Networks: A Secrecy Perspective,” IEEE Transactions
on Communications, 2015, 63(1):229-242.
• When α ≤ d, we find that I = ∞. When the interference [13] R. Zhang, X. Cheng, L. Yang, et al, ”Interference Graph Based
Resource Allocation (InGRA) for D2D Communications Underlaying
tends toward infinity, the normal transmission of cellular users Cellular Networks,” IEEE Transactions on Vehicular Technology, 2015,
will be interrupted. Therefore, this situation must be avoided. 64(8):3844-3850.
[14] N. Yang, L. Wang, G. Geraci, et al, ”Safeguarding 5G wireless commu-
nication networks using physical layer security,” IEEE Communications
• When α > d, we find that I < ∞. Since the dimensional- Magazine, 2016, 53(4):20-27.
ity of space A is d = 2, the path loss exponent ∂ should be set [15] D. Kapetanovic, G. Zheng, F. Rusek, ”Physical layer security for massive
to a value greater than 2. In fact, we set α = 3 to ensure that MIMO: An overview on passive eavesdropping and active attacks,” IEEE
Communications Magazine, 2015, 53(6):21-27.
the interference is infinite. Since the channel exhibits Rayleigh [16] X. Chen, C. Zhong, C. Yuen, et al, ”Multi-antenna relay aided wire-
fading and d = 2, we obtain the following: less physical layer security,” IEEE Communications Magazine, 2015,
53(12):40-46.
E[(hdb )γ ] = Γ(1 + γ) (A.8) [17] W. Trappe, ”The challenges facing physical layer security,” IEEE Com-
munications Magazine, 2015, 53(6):16-20.
and [18] Liu J, Nishiyama H, Kato N, et al,” On the Outage Probability of Device-
cd = πR2 = π, (A.9) to-Device-Communication-Enabled Multichannel Cellular Networks: An
RSS-Threshold-Based Perspective,” IEEE Journal on Selected Areas in
where cd is a unit circle and R = 1 in the two-dimensional Communications, 2016, 34(1):163-175.
[19] J. Yue, C. Ma, H. Yu, and W. Zhou, ”Secrecy-based access control for
space A. By substituting (A.8) and (A.9) into (A.7), we can device-to-device communication underlaying cellular networks,” IEEE
obtain the closed-form result for the Laplace transform given Communications Letters, vol. 17, no. 11, pp. 2068C2071, Nov. 2013.

0018-9545 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2017.2789022, IEEE
Transactions on Vehicular Technology

JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 11

[20] W. He, W. Zhang, W. Bai, et al, ”Improving physical layer security Jiaming Liu received the B.S degree with major on
in underlay D2D communication via Stackelberg game based power Communication and Information System from Nan-
control,” International Conference on Computer, Information and T- jing University of Posts and Telecommunications,
elecommunication Systems, IEEE, 2016:1-5. China in 2016. He is currently a M.S student at Nan-
[21] F. Alavi, N. Yamchi, M. Javan, et al, ”Limited Feedback Scheme for jing University of Posts and Telecommunications,
Device to Device Communications in 5G cellular networks with Relia- China. His research interests include wireless multi-
bility and Cellular Secrecy Outage Constraints,” IEEE Transactions on media communication and physical-layer security in
Vehicular Technology, 2017, PP(99):1-1. wireless networks, etc.
[22] Y. Kwon, H. Suh, J. Oh, et al, ”Energy Efficient Communication for
Secure D2D Underlaid Cellular Networks,” IEEE Transactions on
Vehicular Technology, 2017, PP(99):1-1.
[23] D. Wang, B. Bai, W. Chen, et al, ”Achieving High Energy Efficiency
and Physical-Layer Security in AF Relaying,” IEEE Transactions on
Wireless Communications, 2016, 15(1):740-752.
[24] W. Wang, K. Teh, K. Li, ”Enhanced Physical Layer Security in D2D Mingkai Chen received the M. Sc. degree with ma-
Spectrum Sharing Networks,” IEEE Wireless Communications Letters, jor on Communication and Information System from
2017, 6(1):106-109. Fuzhou University, China in 2014. He is currently
[25] M. Haenggi, J. Andrews, F. Baccelli, et al, ”Stochastic geometry and a Ph. D student at Nanjing University of Posts and
random graphs for the analysis and design of wireless networks,” IEEE Telecommunications, China. His research interests
Journal on Selected Areas in Communications, 2009, 27(7):1029-1046. include wireless multimedia communication and re-
[26] F. Baccelli, A. Giovanidis, ”A Stochastic Geometry Framework for source allocation in wireless networks, etc.
Analyzing Pairwise-Cooperative Cellular Networks,” IEEE Transactions
on Wireless Communications, 2015, 14(2):794-808.
[27] H. Mustafa, M. Shakir, M. Imran, et al, ”Coverage Gain and Device-
to-Device User Density: Stochastic Geometry Modeling and Analysis,”
IEEE Communications Letters, 2015, 19(10):1742-1745.
[28] Y. Wang, Q. Zhu, ”Modeling and Analysis of Small Cells Based on
Clustered Stochastic Geometry,” IEEE Communications Letters, 2016,
PP(99):1-1.
[29] C. Wang, H. Wang, X. Xia, et al, ”Uncoordinated Jammer Selection Guan Gui received the Dr. Eng degree in Infor-
for Securing SIMOME Wiretap Channels: A Stochastic Geometry mation and Communication Engineering from U-
Approach,” IEEE Transactions on Wireless Communications, 2015, niversity of Electronic Science and Technology of
14(5):2596-2612. China (UESTC), Chengdu, China, in 2012. From
[30] X. Zhou, R. K. Ganti, J. G. Andrews, and A. Hj?rungnes, ”On the October 2009 to March 2014, he joined Department
throughput cost of physical layer security in decentralized wireless of Communications Engineering, Graduate School
networks,” IEEE Transactions on Wireless Communications, vol. 10, of Engineering, Tohoku University as for research
no. 8, pp. 2764-2775, Aug. 2011. assistant as well as postdoctoral research fellow,
[31] A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J. respectively. From April 2014 to October 2015, he
Merolla, ”Applications of LDPC codes to the wiretap channel,” IEEE was an Assistant Professor in Department of Elec-
Transactions on Information Theory, vol. 53, no. 8, pp. 2933-2945, Aug. tronics and Information System, Akita Prefectural
2007. University. Since November 2015, he has been a professor with Nanjing
[32] G. Amariucai, S. Wei, ”Active eavesdropping in fast fading channels: University of Posts and Telecommunications, Nanjing, China. He is currently
A Block-Markov Wyner secrecy encoding scheme,” IEEE Transactions engaged in research of deep learning, compressive sensing, and advanced
on Information Theory, 2012, 58(7):4660-4677. wireless techniques. He has published more than 150 papers in prestigious
[33] Y. Zou, X. Wang, W. Shen, ”Optimal Relay Selection for Physical-Layer peer-reviewed journals and conferences. Dr. Gui is the Editor (2017∼) of
Security in Cooperative Wireless Networks,” IEEE Journal on Selected IEEE Transactions on Vehicle Technology and KSII Transactions on Internet
Areas in Communications, 2013, 31(10):2099-2111. and Information Systems. He serves as the international chair for ICNC2018,
[34] Y. Zou, B. Champagne, W. Zhu, et al, ”Relay-Selection Improves TPC members for many conferences such as GLOBECOM, ICC and VTC.
the Security-Reliability Trade-Off in Cognitive Radio Systems,” IEEE He received ICC Best Paper Award in years 2014 and 2017, as well as IEEE
Transactions on Communications, 2015, 63(1):215-228. VTC-spring Best Student Paper Award in year 2014. He is an IEEE Senior
[35] Boyd, Vandenberghe, Faybusovich,” Convex Optimization,” IEEE Trans- Member.
actions on Automatic Control, 2006, 51(11):1859-1859.

Hikmet Sari is currently Professor of Nanjing U-


niversity of Posts and Telecommunications (NUP-
T), and also Chief Scientist of Sequans Commu-
nications. He received his Engineering Degree and
Ph.D. from the ENST, Paris, France, and the post-
Lei Wang received the M.Sc. degree and the Ph.D. doctoral Habilitation degree from the University of
degree in Telecommunications and Information En- Paris-Sud, Orsay. Prior to his current positions, he
gineering from Nanjing University of Posts and held various research and management positions in
Telecommunications, China, in 2007 and 2010, re- industry including Philips Research Laboratories,
spectively. From 2012 to 2013, he was a Postdoctoral SAT, Alcatel, Pacific Broadband Communications,
research fellow at the Department of Electrical Engi- and Juniper Networks. His distinctions include the
neering, Columbia University, USA. He is currently IEEE Fellow Grade (1995), the Andr Blondel Medal (also in 1995), the Edwin
an associate professor at the College of Telecom- H. Armstrong Achievement Award in 2003, the Harold Sobol Award in 2012,
munications and Information Engineering, Nanjing as well as election to Academia Europaea (the Academy of Europe) and
University of Posts and Telecommunications, Chi- to the Science Academy of Turkey in 2012. Prof. Sari has served as an
na. His research interests include millimeter wave Editor of the IEEE Transactions on Communications (1987∼1981), a Guest
wireless communications, device to device communications, physical-layer Editor of the European Transactions on Telecommunications (1993) and of
security, signal processing for communications, cognitive wireless networks, the IEEE JSAC (1999), and an Associate Editor of the IEEE Communications
and random matrix theory. Letters (1999∼2002). He served as a Distinguished Lecturer of the IEEE
Communications Society in 2001 -2006, as a member of the IEEE Fellow
Evaluation Committee in 2002∼2007, and as a member of the Awards
Committee in 2005∼2007.

0018-9545 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

You might also like