Professional Documents
Culture Documents
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2017.2789022, IEEE
Transactions on Vehicular Technology
Abstract—In this paper, we consider physical-layer security growing demands for spectrum resources, and this situation
for device-to-device (D2D) communications underlaying cellular has motivated related efforts for heightening spectral efficiency
networks in which cellular users are under threat from multiple in cellular networks. Device-to-device (D2D) communication
eavesdroppers. We propose an access selection scheme for D2D
users to protect cellular users against eavesdropping. Specifically, [1], as an important complement to cellular networks, can
in our proposed scheme, multiple D2D users whose distance to enable effective reuse of spectrum resources and efficient data
the cellular user are more than the threshold we set will be transmission [2] by means of direct communication between
selected to share the same spectrum as that cellular user, and pairs of users. Thus, the question of how to combine D2D
the interference generated by the selected D2D users can be seen communication with traditional cellular networks to improve
as a jamming measure to interrupt the eavesdropping. Then, we
consider the secrecy throughput as a standard based on which to spectrum resource utilization and network capacity has be-
quantify the security performance of our proposed scheme, and come a hot topic of research in academia and industry [3]–[8].
we derive a closed-form expression for the secrecy throughput The core of D2D communication is that two communication
of a cellular user with the aid of stochastic geometry. Moreover, devices, called a D2D pair, communicate directly in close
by using the optimization method, we prove the existence of proximity through spectrum sharing, without imposing an
optimal threshold and design an iterative algorithm based on the
advance-and-retreat method to determine the optimal threshold. additional burden on the base station. However, such spectral
Simulation results show that our access selection scheme can reuse inevitably leads to problems such as interference. Thus,
effectively improve the physical-layer security of cellular users much of the literature on D2D communication [9]–[11] is
and that the maximum secrecy throughput can be achieved with devoted to reducing the side effects of D2D communication-
the optimal threshold. s in cellular networks through interference management or
Index Terms—Physical-layer security, D2D communication, suppression. In [12], the authors utilize a destination routing
Stochastic geometry, Access selection, Optimization method algorithm to design a multi-hop routing scheme for cyber-
physical systems to avoid interference among cellular users.
I. I NTRODUCTION In [13], the authors utilize a novel interference graph to model
the relationships between different D2D communication links.
As mobile communication enters the 5G era, the number of In these works, the interference generated by D2D users is
network users and the level of service demands are explosively considered to be a harmful phenomenon that will severely
growing. This high density of users and the accompanying disrupt cellular users and needs to be suppressed and isolated
network service requirements will inevitably place an increas- through various schemes.
ingly heavy burden on traditional cellular networks. In fact, However, this interference can also have a positive effect
the existing cellular network architecture cannot satisfy the in protecting cellular users from eavesdropping when we
Copyright (c) 2015 IEEE. Personal use of this material is permitted. consider the interference problem from the perspective of
However, permission to use this material for any other purposes must be physical-layer security. In the context of the physical layer
obtained from the IEEE by sending a request to pubs-permissions@ieee.org. [14], secure communication is ensured when the achievable
This work was partially supported by the National Natural Science Foun-
dation of China (61571240, 61671253), the Priority Academic Program rate between the signal source and the legitimate receiver
Development of Jiangsu Higher Education Institutions; the Natural Science is higher than that between the source and eavesdroppers.
Foundation of Jiangsu Province (BK20161517), the Open Research Fund of In particular, many recent works [15]–[18] have revealed
National Local Joint Engineering Research Center for Communication and
Network Technology, Nanjing University of Posts and Telecommunications that cooperative relaying is a reliable method of enhancing
(TXKY17005), the Open Research Fund of the State Key Laboratory of physical-layer security. In [19], the authors considered D2D
Integrated Service Networks, Xidian University (ISN17-04), and the Major communication in the context of physical-layer security for
Projects of the Natural Science Foundation of the Jiangsu Higher Education
Institutions (16KJA510004), Jiangsu Specially Appointed Professor Grant the first time, turning the interference induced by D2D pairs
(RK002STP16001), Innovation and Entrepreneurship of Jiangsu High-level into a jammer to intercept eavesdroppers and proposing an
Talent Grant (CZ0010617002), and ”1311 Talent Plan” of Nanjing University access scheme to limit the transmission power of D2D pairs. A
of Posts and Telecommunications.
The authors are with the National Engineering Research Center for Stackelberg-game-based power selection algorithm is proposed
Communication and Network Technology, Nanjing University of Posts and in [20] to enhance the security performance of D2D pairs
Telecommunications, Nanjing 21003, China (Emails: {wanglei, 1016010414, by improving the secrecy energy efficiency. In view of the
guiguan, hikmet}@njupt.edu.cn, mingkaichen1989@163.com).
L. Wang is also with The State Key Laboratory of Integrated Service cross-interference between a cellular user and a D2D pair,
Networks, Xidian University, Xi’an 710126, China. [21] studies the influence of resource allocation on security
0018-9545 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2017.2789022, IEEE
Transactions on Vehicular Technology
among a large number of D2D pairs remains a sticking point in Fig. 1: A D2D communication system underlaying a cellular network with the reuse of
downlink resources.
efforts to ensure the physical security of D2D communications
underlaying a cellular network.
In this paper, we investigate physical-layer security for
The remainder of this paper is organized as follows. Section
D2D communications underlaying cellular networks in which
II presents the system model of the D2D-underlaid cellular
multiple D2D pairs share the spectrum with a cellular user
network, the access selection scheme and the definition of se-
who may be overheard by multiple eavesdroppers. We use
crecy throughput. The modeling process for random geometry
the interference generated by the D2D pairs to confuse the
is also described as part of the system modeling discussion.
eavesdroppers. We formulate this scenario as an optimization
Next, we derive the expression for the secrecy throughput
problem in which the objective is to maximize the achievable
by analyzing an eavesdropper’s probability of outage and the
secrecy throughput of cellular users. In addition, compared
coverage probability of the cellular user in Section III . Then,
with previous related works, we consider a more general
we analyze the optimal threshold for access selection scheme
scenario in which both the D2D pairs and the eavesdroppers
and design the relevant practical algorithms in Section IV,
are randomly distributed and multiple D2D pairs can simul-
followed by the presentation and analysis of numerical results
taneously share the spectrum with a given cellular user. The
in Section V. A conclusion is presented in Section VI.
main contributions of this paper are summarized as follows:
• We construct a new cellular network scenario in which II. P ROBLEM F ORMULATION
multiple D2D pairs can share the same spectrum as a
A. System model
single cellular user. Also, we assume that the positions
of the D2D pairs are random as well as those of the In this paper, we consider D2D communications underlay-
eavesdroppers. Unlike in [24], multiple eavesdroppers can ing a cellular network that consists of a base station (BS) lo-
collaboratively tap into legitimate transmissions from the cated in the present cell, a cellular user Bob who receives data
cellular user. from the BS, multiple D2D pairs with certain communication
• We propose a novel access selection scheme to control requirements, and multiple eavesdroppers (Eves). It is impor-
the interference generated by the D2D pairs and improve tant to note that only D2D pairs that are selected as protection
the secrecy throughput of the cellular user. Unlike in pairs can reuse the same spectrum as the cellular user; not
previous related works, in our proposed scheme, we select all D2D pairs share the spectrum with the cellular user. By
a subset of the D2D pairs as D2D protection pairs which sharing the spectrum, eavesdroppers can arbitrarily overhear
is permitted to share the spectrum with the cellular user and capture data transmissions from the BS to Bob, and
according to distance. We set a threshold µ to limit the we cannot obtain information on the eavesdroppers’ physical
distance between D2D protection pairs and the cellular locations or eavesdropping channels because the eavesdroppers
user, rather than limiting the power of the D2D pairs as are passive. In addition, every node in the cellular network is
in [19] or channel gains in [24]; thus, our scheme does equipped with a single antenna. The structure of the system
not affect the data transmission capabilities of the D2D is shown in Fig.1.
links. We apply both large-scale fading and small-scale fading
• We design an iterative algorithm based on the advance- for channels in the underlaying model. The large-scale fading
and-retreat method to determine the feasible optimal satisfies the standard path loss model
threshold for our scheme. Simulation results show that
l(r) = r−α , (1)
our scheme achieves a substantial improvement in terms
of secrecy throughput over the schemes presented in [19] where r represents the distance and α > 2 [25] is the path
and [24]. loss factor. In addition, we assume that the small-scale fading
0018-9545 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2017.2789022, IEEE
Transactions on Vehicular Technology
TABLE I:
LIST OF KEY NOTATIONS AND VARIABLES USED IN THIS PAPER R2 and consider densities of λD and λE , respectively. We
denote the positions of all D2D pairs, the D2D protection pairs
Symbol Meaning
and the eavesdroppers by ΦD , ΦsD and ΦE , respectively. In
α Path loss factor this paper, the two-dimensional space considered is simply the
ΦD Set of D2D pairs circular area R2 covered by a cellular network with radius R.
ΦSD Set of selected D2D protection pairs The notations used in this paper are summarized in Table I.
ΦE Set of eavesdroppers
Average transmission power of the D2D
PD
pairs B. SINR model
PB Transmission power of the BS
Rt Transmission rate of the cellular user The channel model used in this paper satisfies the following
Rs Secrecy rate of the cellular user expression:
Interference received at Bob generated by Pr = Pt · h · r−α , (2)
D
IB
the D2D protection pairs where Pt is the transmission power of the transmitter; Pr is
D Interference received at the jth Eve gener- the received power at the receiver; h ∼ exp(1) is the channel
IEj ated by the D2D protection pairs gain, which follows an i.i.d Rayleigh fading process; and α is
Ts Secrecy throughput the fading exponent.
Connection success probability of the cel- D
In the cellular network, Bob receives interference IB from
Pcs
lular user the co-channel D2D protection pairs, while the Eves also
Po Outage probability of the eavesdroppers receive interference IED
from the co-channel D2D protection
SINR threshold for outage for the eaves- pairs.
δC
droppers The interference affecting Bob can be expressed as
SINR threshold for connection success for
δE db −α
X
D
the cellular user IB = PD (hdb
i )(ri ) , (3)
rBb Distance between the BS and Bob i∈ΦS
D
Distance between the ith D2D pair D2Di where PD is the transmission power of the D2D protection
ridb
and Bob pairs and hdb and ridb are the channel gain and distance,
i
de Distance between the ith D2D pair D2Di respectively, between D2Di and Bob.
rij
and the jth Eve Evej The interference affecting the jth Eve can be expressed as
Channel gain between the ith D2D pair
hdb D
X
de −α
i D2Di and Bob IEj
= PD (hde
ij )(rij ) , (4)
Channel gain between the ith D2D pair i∈ΦS
hde
ij
D
D2Di and the jth Eve Evej
where hde de
ij and rij are the channel gain and distance, re-
No Power of AWGN noise
spectively, between D2Di and Evej . Thus, we can determine
the received signal-to-interference-plus-noise ratios (SINRs) at
Bob and the Eves.
is an independent quasi-static Rayleigh fading phenomenon The received SINR at Bob can be expressed as
whose channel gains follow an exponential distribution with a −α
parameter of 1, as in [26]. PB hBb (rBb )
SIN RB = D +N
In the cellular network, relative to the single fixed cellular IB 0
user, the distribution of the multiple D2D pairs is random,
and their locations are difficult to acquire. At the same time, −α
(5)
PB hBb (rBb )
the Eves passively work to maintain the eavesdropper state. = P −α ,
In this case, it is difficult for the traditional physical model to PD (hdb db
i )(ri ) + N0
i∈ΦS
describe the distribution characteristics of the eavesdroppers D
and D2D pairs in the current cell. where PB is the transmission power of the BS; hBb and rBb
Fortunately, a stochastic geometric model can well represent are the channel gain and distance, respectively, between the
the statistical properties of these random distributions without BS and Bob; and N0 is the noise power.
knowledge of the exact locations. In related research on the The received SINR at Evej can be expressed as
application of stochastic geometric tools in wireless networks, −α
such as [27] and [28], such random distributions are usually PB hBe Be
j (rj )
SIN REj = D
described by means of Poisson point processes (PPPs), and IEj + N0
the statistical properties of such a distribution are described
by quantitative features such as expectation and density, which (6)
−α
are also widely adopted in research on physical-layer security PB hBe Be
j (rj )
= P −α ,
[29], [30]. Therefore, we model the positions of the D2D pairs PD (hde de
ij )(rij ) + N0
and the Eves using two independent homogeneous PPPs on i∈ΦS
D
0018-9545 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2017.2789022, IEEE
Transactions on Vehicular Technology
The probability of this condition is called the connection ΦSD = {ridb |µ ≤ ridb ≤ R+rBb andi ∈ ΦD }, (11)
success probability, denoted by Pcs . where µ is the selection threshold for D2D protection pairs,
Meanwhile, a secrecy outage will occur under the condition R+rBb is the maximum of ridb in the cell.
that the capacity of Alice communicating to multiple Eves is By treating the access threshold µ as the main variable of
higher than the redundancy rate [33], [34]. This condition can interest, the problem of maximizing the secrecy throughput Ts
similarly be expressed as can be reformulated as
log2 (1 + SIN RE ) > Rt − Rs . (8) max Ts
µ
The probability of this condition is called the secrecy outage µ ≤ R+rBb . (12)
probability, denoted by Po . s.t. log2 (1 + SIN RB ) > Rt
log2 (1 + SIN RE ) > Rt − Rs
Therefore, the secrecy throughput (Ts ) can be defined as
Ts = Rs Pcs (1−Po ). (9) By solving this optimization problem, we can determine the
optimal threshold µ that maximizes the security performance
By adjusting the number of selected D2D protection pairs, of our scheme. Simultaneously, to simplify the optimization
the achievable secrecy throughput can be maximized. We problem, we need to analyze the connection success proba-
formulate this optimization problem as follows: bility of the cellular user and the outage probability of the
max Ts eavesdroppers to derive a suitable expression for Ts .
.
log2 (1 + SIN RB ) > Rt (10)
s.t.
log2 (1 + SIN RE ) > Rt − Rs B. Connection success probability of the cellular user
In this subsection, we analyze the connection success prob-
III. ACCESS S ELECTION S CHEME ability of the cellular user.
In this section, we propose an access selection scheme for In the access assignment scheme, when the selected D2D
selecting the appropriate D2D pairs as protection pairs such protection pairs share the spectrum with Bob, the interference
D
that the communication security of the cellular user to be IB received by Bob will grow and affect the capacity of
protected is maximized. Then, we derive the outage probability the channel between the BS and Bob. In accordance with
of the eavesdroppers and the connection success probability of (7), to ensure connection success for Bob, we should set the
the cellular user. threshold for SIN RB appropriately to limit the number of
D2D protection pairs.
For a cellular user, we denote the SINR threshold for
A. Acess threshold
connection success by δC , which satisfies
When reusing spectrum resources, D2D pairs will inevitably
induce same-frequency interference. This interference will log2 (1 + δc )=Rt , (13)
affect the communication quality of both cellular users and where δC is the minimum SIN RB that can satisfy the
eavesdroppers. When sharing the spectrum with a cellular requirement on the transmission rate Rt and ensure that Bob
user, the D2D pairs which are far from the cellular user may can successfully decode the received signals.
not be sufficient to effectively interfere with eavesdropping, Then, we can use δC to express Pcs as follows:
whereas the D2D pairs which are close to the cellular user
can cause excessive interference and thus inhibit the cellular Pcs = P rob(SIN RB ≥ δC ). (14)
user’s normal communication.
By combining (14) and (15), we can obtain the following
Therefore, it is necessary to select an appropriate distance
relationship between δC and the transmission rate Rt :
between D2D protection pairs and the cellular user to ensure
that the communication security of the cellular user will be δC =2Rt −1. (15)
0018-9545 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2017.2789022, IEEE
Transactions on Vehicular Technology
Hence, using the definition of SIN RB given in (5), we C. Outage probability of the eavesdroppers
obtain the following expression for the connection success
probability of the cellular user in the access assignment
This subsection analyzes the outage probability of the access
scheme:
assignment scheme. Similarly to (14), we denote the SINR
Pcs = P rob (SIN RB ≥ δC ) threshold for connection outage by δE , which satisfies
−α
PB (hBb )(r Bb )
= P rob D +N ≥ δC
IB 0
D
log2 (1 + δE )=Rt − Rs , (21)
δ (N0 +IB )
= P rob hBb ≥ PC (rBb ) −α
B
α where δE is the maximum SIN RE that satisfies the require-
δ (r Bb ) (N0 +IBD
)
= EIBD exp − C PB ment on the secrecy rate Rs .
Bb α α
δ (r Bb ) I D
= exp − δC (rPB) N0 EIBD exp(− C PB B ) , Then, we can use δE to express Po as
α D
(16) Po = P rob(SIN RE ≥ δE ). (22)
δC (r Bb ) IB
where EIBD exp(− PB ) is difficult to simplify by
the general way. Here, we use Laplace transform to solve this By combining (21) and (22), we can obtain the relationship
problem. According to [25], we have between δE and the transmission rate Rt − Rs as follows:
where LIBD (s) is defined as the Laplace transform of interfer- Hence, using the definition of SIN RE given in (6), we ob-
D
ence IB evaluated at s. tain the outage probability of the Eves in the access assignment
Bb −α scheme as follows:
Therefore, when set s = δC (r PB) PD , we can turn
α Po = P rob(SIN RE ≥ δE )
δ (r Bb ) I D
D
EIBD exp(− C PB B ) into EIBD exp(−sIB ) which is = 1 − P rob (SIN RE ≤ δE )
easier to simplify. Be −α
PB (hBe
P
j )(rj )
D db α
PD (hdb
P
Since IB = i )(ri ) , we can have
j∈ΦE
= 1 − P rob ≤ δE
i∈ΦS D +N )
(IE
D
j 0
D
LIBD (s)=EIBD exp(−sIB )
−α
−α PB (hBe )(rjBe )
exp(−shdb (ridb ) ))
Q Y j
= E( =1−E (P rob( ≤ δE ))
(I D +N )
i∈ΦS
D E 0
R R+rBb j∈Φ E j
db db −α
= exp(− µ Eh (1 − e−sh (ri ) )λD dridb ) = 1 − exp{−λE π
= exp( λα−1
Dπ
((R+rBb )−(α−1) − µ−(α−1) ) Be −α
!
PB hBe
j (rj )
Z
2
2
· Γ(1 + α )Γ(1 − α2 )s α ). · (1 − P rob D +N
≥ δE dσEj )},
(18) R2 IE j 0
The proof of (17) and (18) is shown in Appendix A. (24)
Bb α
where σEj is the position of Evej and the function given in
By substituting s = δC (r PB) PD
into (18), we can obtain (24) is a complex two-dimensional integral associated with the
the following result for LIbD (s) eavesdroppers’ location information.
Bb −α
To simplify, we first calculate the value of the accumulated
LIBD δC (r PB) PD
function as follows:
= exp{ λα−1
Dπ
[(R+rBb )−(α−1) − µ−(α−1) ] (19) −α !
2 2 2
δC PD α Bb 2 PB (hBe )(rjBe )
· (1 + α )Γ(1 − α )( PB ) (r ) }, P rob ≥ δE
D +N )
(IE
R +∞ j 0
where Γ(x) = 0 tx−1 e−t dt is the gamma function. Note
de −
α
Be α
) (hde
P
δE [N0 + PD (rij ij )](rj )
that each instance of the gamma function in the above expres- Be i∈ΦS
D
sion depends on the path loss factor α. = P rob h ≥
PB
Then, by substituting (19) into (16), we obtain
α −α
δE (rjBe ) [N0 + PD de
(hde
P
(rij ) ij )]
Bb α
i∈ΦS
D
Pcs = exp{− δC (rPB) N0 + λα−1 Dπ
[(R+rBb )−(α−1) − µ−(α−1) ] = EIEDj exp(− )
PA
· Γ(1 + α2 )Γ(1 − α2 )( δCPPBD )2/α (rBb )2 },
(20) α ! α !
δE (rjBe ) N0 δE (rjBe ) PD
which provides a closed-form expression for the connection = exp − LIED ,
success probability of the cellular user in the presence of PB j PB
interference from the D2D protection pairs. It can be observed (25)
D
from (20) that the connection success probability depends only where LIEDj (s) is the Laplace transform of IEj . Specifically, it
on µ. is a two-dimensional Laplace transform in the two-dimensional
0018-9545 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2017.2789022, IEEE
Transactions on Vehicular Technology
area of the cell, which is expressed as follows: Although we have the closed-form secrecy throughput ex-
! pression presented in the previous section, we cannot directly
de de −α determine the optimal threshold for maximizing the physical-
Q
LIED (s) = E exp(−shij (rij ) )
j
i∈ΦS
D
layer security protection for cellular users. Here, we analyze
de −α
R de
= exp − R2 Eh [1 − eshij (rij ) ]λSD dσ the security throughput and prove that it is a quasi-concave
2 function. Then, we design an iterative algorithm based on the
= exp[−λD π(R−α − µ−α )Γ(1 + α2 )Γ(1 − α2 )s α ], advance-and-retreat method to obtain the optimal threshold.
(26)
where s is the Laplace transform α
of SIN RE .
δE (rjBe ) PD
By substituting s = PB into (26), we can obtain
the following result for the Laplace transform: A. Secrecy Throughput Analysis
−α
δE (rjBe ) PD
LIED [ PB ]
j According to the previous analysis, we find that there is an
= exp(−λD π(R − µ−α )Γ(1 + α2 )
−α (27)
2
optimal threshold µo that can help us to achieve the optimal
· Γ(1 − α2 )( δEPPBD ) α ), secrecy throughput, that is, the optimal trade-off between the
beneficial interference received by the Eves and the harmful
where rjBe it is an uncertain value due to the random distri-
interference received by Bob. Before deriving the optimal
bution of the Eves and we have obtained its expectation value
threshold, we must first prove that the secrecy throughput Ts
by means of the Laplace transform.
is a quasi-concave function of the threshold µ. The quasi-
By combining (25) and (27), we can obtain the correspond-
concavity of the secrecy throughput is given by Theorem 1:
ing expression for the integral function as follows:
−α
Theorem 1: Ts is a quasi-concave function with respect to
PB (hBe )(rjBe ) µ.
P rob D
(IE +N0 )
≥ δE
j
δE N0 (28) Proof: To simplify the expressions, we use the parameters
= exp{− − λ π(R−α − µ−α ) D
PB
2
a and b to rewrite the connection success probability of
· Γ(1 + α2 )Γ(1 − α2 )( δEPPBD ) α }. the cellular user (Pcs ) and the outage probability of the
Finally, by substituting (28) into (24), we obtain eavesdroppers (Po ), respectively.
Here, we define
Po =
λE
1 − exp(− δ 2 )
E N0 2
+λD π(R−α −µ−α )Γ(1+ α 2
)Γ(1− α )(
δE PD
)α Bb α
PB
(29)
PB
a = − δC (rPB) N0 + λα−1
Dπ
[(R+rBb )−(α−1) − µ−(α−1) ]
α
which provides a closed-form expression for the outage prob- · Γ(1 + α )Γ(1 − α )( δCPPBD ) 2 (rBb )2 ,
2 2
probability and the outage probability, using the definition where both a and b are functions of the variable µ, and we
given in (9), we can obtain a complete expression for the can rewrite the Pcs and Po as
secrecy throughput Ts , as shown in (30). This expression will
help us to investigate the optimal threshold on the number of Pcs = exp(a), (34)
D2D protection pairs for maximizing the secrecy throughput.
Po = 1 − exp(b). (35)
IV. S ECRECY T HROUGHPUT A NALYSIS AND We can also obtain the first-order partial derivatives of a and
O PTIMIZATION b as follows:
In this section, we present the secrecy throughput analysis ∂a 2 2 δC PD α Bb 2
and optimization method for the access assignment scheme. = λD πµ−α Γ(1 + )Γ(1 − )( ) 2 (r ) , (36)
∂µ α α PB
Ts = Rs · Pcs · (1−Po )
Bb α 2
=Rs · exp[− δC (rPB) N0 − λD π Bb −(α−1)
α−1 ((R+r ) − µ−(α−1) )Γ(1 + α2 )Γ(1 − α2 )( δCPPBD ) α (rBb )2 ]
λE
· exp[− δ N 2 ]
E 0 +λ π(R−α −µ−α )Γ(1+ 2 )Γ(1− 2 )( δE D P
)α
PB D α α PB
α
δC (r Bb ) N0 λD π 2
(30)
=Rs · exp[− PB − Bb −(α−1)
α−1 ((R+r ) − µ−(α−1) )Γ(1 + α2 )Γ(1 − α2 )( δCPPBD ) α (rBb )2 ]
λE
− δ N δE PD
2
E 0 2 2
PB +λD π(R−α −µ−α )Γ(1+ α )Γ(1− α )( PB )α
0018-9545 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2017.2789022, IEEE
Transactions on Vehicular Technology
2 2
∂ a ∂ b
Here, we can find that ∂n 2 + ∂n2 ≤ 0 when µ satisfies
∂(a+b)
∂b
= ∂µ = 0. Therefore, (a + b) is a quasi-concave function of
∂n
λE λD παµ−(α+1) Γ(1+ α
2 2 δE PD
2
)α
µ and Ts is also a quasi-concave function of µ, from which
)Γ(1− α )( PB . (37)
δ N0 δ PD
2 2 Theorem 1 can be derived.
2 2
( E
PB +λD π(R−α −µ−α )Γ(1+ α )Γ(1− α )( E
PB )α )
∂ 2 (a+b)
∂µ2
2
2
−(α+1) 2 2 δC PD α λE λD πα(α + 1)µ−(α+2) Γ(1 + α2 )Γ(1 − α2 )( δEPPBD ) α
= − αλD πµ Γ(1 + )Γ(1 − )( ) − 2 4
α α PB
| {z } ( δEPN0 + λD π(R−α − µ−α )Γ(1 + α2 )Γ(1 − α2 )( δEPPD ) α )
B B
T1
(39)
| {z }
T2
4
2 2 −2(α+1) 2 2 2 2 δE PD α
λE λD π αµ Γ (1 + α )Γ (1 − α )( PB )
− 2 4
( δEPN0 + λD π(R−α − µ−α )Γ(1 + 2
α )Γ(1 − 2 δE PD α
α )( PB ) )
| B {z }
T3
0018-9545 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2017.2789022, IEEE
Transactions on Vehicular Technology
Ts = Ts (xk+1 ) 0.2
else 0.1
k0 = k 0
Ts = Ts (xk ) 10 20 30 40 50 60 70 80 90 100 110
Threshold µ (m)
return k0 , Ts
Fig. 2: The outage probability Po of the Eves versus the threshold µ for different λE
end if values, where PD = 10 dBm.
end for
for k = k0 + 1; k ≤ m; k + + do
xk = k 0 · ζ 1.8
xk+1 = k 1.6
Theoretical(λ =0.002)
E
Theoretical(λE =0.004)
if Ts (xk+1 ) > Ts (xk ) then Theoretical(λE =0.006)
end for 0
20 30 40 50 60 70 80 90 100 110
Threshold µ (m)
Fig. 3: The secrecy throughput of the cellular user versus the threshold µ for different
three different values of λE . This means that the D2D protec- λE values, where Rt = 5 bps/Hz, Rs = 4 bps/Hz, PD = 10 dBm and
λD = 0.001.
tion pairs we select can effectively suppress and interrupt the
eavesdropping links for different densities of eavesdroppers.
At the same time, the eavesdropper density λE also affects
the rate of increase of the outage probability. To achieve the initially shows an obvious improvement. After this growth, the
same outage probability Po with a higher eavesdropper den- secrecy throughput reaches a peak and then rapidly decreases.
sity, a smaller µ are required. Moreover, although increasing This proves the Theorem 1 that Ts is a quasi-concave function
the threshold µ can significantly reduce the eavesdropper’s of µ and there exists an optimal threshold µo can maximize
probability of interruption, the efficiency of this improvement the security performance of cellular users. Additionally, in
can be divided into two periods. In the first period, when the Fig.3, we also mark the position of optimal threshold µo where
threshold µ is small, the outage probability decreases slowly. secrecy throughput achieves maximum. We can observe that,
In the second period, the decline of the outage probability the position of optimal threshold µo obtained by Algorithm
becomes rapid, and the outage probability approaches to 0. 1 matches well with that obtained through simulation. This
This phenomenon can be explained by the fact that the outage verified that our proposed iterative algorithm can help us to
probability of the eavesdroppers is not linearly related to the find the optimal threshold µo effectively.
distance between D2D protection pairs and Bob. In other Fig. 4 shows the optimal threshold µo versus the eaves-
words, when the distance threshold µ is more than a certain dropper density λE for different values of the transmission
value, their inhibitory effect on the eavesdroppers will become power PD of the D2D pairs. It can be seen from Fig. 4 that
exceptionally weak, below which increasing the threshold µ the values of µo calculated by Algorithm 1 agree well with
will not reduce the outage probability obviously. those obtained through simulation. We also observe that as the
Fig. 3 shows the secrecy throughput versus the threshold µ density of eavesdroppers increases, the optimal threshold µo
used in our proposed scheme for different eavesdropper densi- simultaneously decreases. This can be explained by the fact
ties λE . As shown in Fig.3, the theoretical secrecy throughput that more beneficial interference from D2D protection pairs is
calculated using (30) agree well with those obtained through required to ensure the deterioration of eavesdropping channels
simulation under different λE conditions, which further ver- as λE increases. Fig. 4 also shows that the transmission power
ifies our analysis of the secrecy throughput. Moreover, we of the D2D pairs markedly affects the value of the optimal
find that as the threshold µ increases, the secrecy throughput threshold µo . A higher transmission power of the D2D pairs
0018-9545 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2017.2789022, IEEE
Transactions on Vehicular Technology
70
scheme presented in [24], in which the channel gains are used
60 as the selection criteria, cannot effectively limit the distance
50
ridb as well as the amount of interference caused by the D2D
Algorithm 1(P =12dBm)
D
Algorithm 1(PD=10dBm)
pairs, which will adversely affect the data transmission of
40 Algorithm 1(PD=8dBm) the cellular user they are intended to protect. By contrast,
Simulation(P =12dBm)
D
Simulation(P =10dBm)
our scheme can effectively select the D2D protection pairs
30
according to ridb and limit this harmful interference, thereby
D
Simulation(P =8dBm)
D
Fig. 4: The optimal threshold µo versus the density of Eves λE for different PD VI. C ONCLUSION
values, where λD = 0.001 and r Bb = 10 m.
In this paper, we discuss physical-layer security in a D2D-
underlaid cellular network from the perspective of protecting
2 a cellular user’s communication security. We select multiple
1.8 The proposed access selection scheme D2D pairs to serve as protection pairs by sharing the same
Secrecy-based access control scheme
1.6 Guard zone based access control scheme spectrum as the cellular user to be protected in order to resist
1.4
eavesdroppers. First, we select the D2D protection pairs from
all D2D pairs according to the distance between the D2D
Secrecy Throughput T s
1.2
pairs and the cellular user. Then, we set a threshold for the
1
distance in order to amplify the performance of our scheme
0.8
in terms of throughput. With the help of an optimization
0.6
method and stochastic geometry, we derive the expression
0.4 of throughput in our scheme and design a one-dimensional
0.2 search algorithm to determine the feasible optimal threshold
0 which can maximize the secrecy throughput of the cellular
-10 -8 -6 -4 -2 0 2 4 6 8 10
P D(dBm) user. On this basis, an access selection scheme for D2D users
is proposed that achieves the optimal physical-layer security
Fig. 5: Performance comparison of different schemes, where λE = 0.001,
λD = 0.001, PD = 10 dBm and r Bb = 10 m. performance for D2D communications underlaying cellular
networks. Simulation results show that the proposed access
selection scheme can effectively intercept eavesdroppers and
will lead to a larger threshold µ0 . This phenomenon can be enhance the communication security of cellular users by means
explained by the fact that the higher transmission power of of an optimal threshold.
the D2D pairs can amplify the interference effect generated by It is necessary to note that the case investigated in this paper
the D2D protection pairs and we need to expand the distance is a simple one in which only a single cellular user is protected
between D2D protection pairs and Bob in order to limit the by multiple D2D protection pairs in the presence of multiple
interference. eavesdroppers. It would be interesting to study a more general
In Fig. 5, we plot the secrecy throughput versus the trans- case in which multiple cellular users require physical-layer
mission power of the D2D protection pairs for our scheme security protection under threat from multiple eavesdroppers.
as well as the secrecy-based access control scheme presented In contrast to a single cellular user, multiple cellular users will
in [19] and the joint-guard-zone-based access control scheme use multiple independent spectra, and thus, a more flexible
presented in [24]. The threshold used in our proposed scheme access strategy will be required to coordinate the conflicting
is the threshold µo obtained by Algorithm 1. As shown in Fig. security requirements for different cellular users. This problem
5, as the D2D protection pairs’ transmission power increases, will be explored in our future work.
the three schemes show considerably different performance
in terms of the secrecy throughput. Specifically, the secrecy- A PPENDIX A
based access control scheme performs the worst, and our pro- P ROOF OF THE T WO -D IMENSIONAL L APLACE T RANSFORM
posed scheme is better than the others. One can observe from
To prove the result for the Laplace transform given in (18),
Fig. 5 that as PD increases, the secrecy throughputs of our
we derive the general expression for a Laplace functional. A
scheme and the joint-guard-zone-based access control scheme D
set IB that follows one or more PPPs can be described as a
are significantly enhanced, whereas that of the opportunistic
set of points in a certain area A of the cell of interest. We
jammer selection scheme improves relatively slowly. This
use the intensity measure Λ to represent the average number
indicates that the multiple D2D protection pairs adopted in our D
of points in IB ; it is defined as
scheme and the joint-guard-zone-based access control scheme
enable much better security performance than the single one Λ(A)= ID
B (A), (A.1)
0018-9545 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2017.2789022, IEEE
Transactions on Vehicular Technology
where ID D
B (A) denotes the number of points in IB . Then, in (19) as follows:
D
we can define the 2-dimensional Laplace functional of IB as Y
de −α
follows: LIED (s) = E[ exp(−shde
ij (rij ) )]
R D j
LIBD = E[e R2 f (x)Ib (dx) ] i∈ΦS
D
P
− x∈I D f (x)
, (A.2) Z
de de −α
= E[e b ] = exp{− Eh [1 − eshij (rij ) ]λSD dσ} (A.10)
R2
D
where f is a function on A. In the case that all points in IB 2 2 2
= exp[−λSD πΓ(1 + )Γ(1 − )s α ].
satisfy PPPs, α αc
Z
LIBD = exp(− (1 − e−f (x) )Λ(dx)). (A.3)
R2
R EFERENCES
D
Since IB is the interference set, we can express the total [1] A. Asadi, Q. Wang, V. Mancuso ”A Survey on Device-to-Device
interference power measured at a point x in the cell as follows: Communication in Cellular Networks,” IEEE Communications Surveys
X & Tutorials, vol. 16, no. 4, pp. 1801-1819, Apr. 2014.
I(x) = l(kx − Y k), (A.4) [2] Liu J, Kato N, Ma J, et al,” Device-to-Device Communication in LTE-
Advanced Networks: A Survey,” IEEE Communications Surveys &
Y ∈ΦS
D Tutorials, 2017, 17(4):1923-1940.
[3] X. Lin, J. G Andrews, A. Ghosh, ”An overview of 3GPP device-to-
where Y represents the position of the transmitter in each of device proximity services,” IEEE Communication Magazine, vol.52, no.
the D2D protection pairs. Here, we consider the interference 4, pp. 40- 48, Apr. 2014.
as a shot noise process and calculate the Laplace transform of [4] L. Zhou, ”Mobile Device-to-Device Video Distribution: Theory and
Application,” ACM Transactions on Multimedia Computing, Commu-
the interference as follows: nications and Applications, vol. 12, no.3, pp. 1253-1271, 2015.
LI (s) = E[e−sI ] [5] R. Yin, C. Zhong, G. Yu, et al, ”Joint Spectrum and Power Alloca-
Y tion for D2D Communications Underlaying Cellular Networks,” IEEE
= E[ exp(−sl(r))]. (A.5) Transactions on Vehicular Technology, 2016, 65(4):2182-2195.
[6] D. Wu , L. Zhou , Y. Cai, ”Social-Aware Rate Based Content Sharing
r∈ΦS
D Mode Selection for D2D Content Sharing Scenarios,” IEEE Transactions
on Multimedia, 2017, PP(99):1-1.
[7] Tang F, Fadlullah Z M, Kato N, et al,”AC-POCA: Anti-Coordination
To account for the fading terms, we can assert that the Game based Partially Overlapping Channels Assignment in Combined
interference satisfies i.i.d. fading h as follows: UAV and D2D based Networks,”IEEE Transactions on Vehicular Tech-
nology, 2017, PP(99):1-1.
l(rdb ) = hd b(rdb )−α . (A.6) [8] Wu D, Zhou L, Cai Y, et al,” The role of mobility for D2D commu-
nications in LTE-advanced networks: energy vs. bandwidth efficiency,”
Wireless Communications IEEE,2014, 21(2):66-71.
[9] F. Malandrino, Z. Limani, C. Casetti, et al, ”Interference-Aware Down-
Since fading is defined as an independent point process, we link and Uplink Resource Allocation in HetNets With D2D Support,”
can simplify (A.3) by moving the expectation value of hd b IEEE Transactions on Wireless Communications, 2015, 14(5):2729-
inside the product. Thus, we can transform (A.3) as follows: 2741.
[10] X. Liu, Y. Li, X. Li, et al, ”Pilot Reuse and Interference-Aided MMSE
γ
Detection for D2D Underlay Massive MIMO,” IEEE Transactions on
LIBD (s) = exp(−λSD cd E[(hdb )γ Γ(1 − γ)s ], (A.7) Vehicular Technology, 2017, 66(4):3116-3130.
[11] L. Ferdouse, W. Ejaz, K. Raahemifar, et al, ”Interference and throughput
where γ = αd . We find that the expression above is valid aware resource allocation for multi-class D2D in 5G networks,” IET
only in the case of γ < 1. Thus, we can draw the following Communications, 2017, 11(8):1241-1250.
conclusions: [12] C. Ma, J. Liu, X. Tian, et al, ”Interference Exploitation in D2D-
Enabled Cellular Networks: A Secrecy Perspective,” IEEE Transactions
on Communications, 2015, 63(1):229-242.
• When α ≤ d, we find that I = ∞. When the interference [13] R. Zhang, X. Cheng, L. Yang, et al, ”Interference Graph Based
Resource Allocation (InGRA) for D2D Communications Underlaying
tends toward infinity, the normal transmission of cellular users Cellular Networks,” IEEE Transactions on Vehicular Technology, 2015,
will be interrupted. Therefore, this situation must be avoided. 64(8):3844-3850.
[14] N. Yang, L. Wang, G. Geraci, et al, ”Safeguarding 5G wireless commu-
nication networks using physical layer security,” IEEE Communications
• When α > d, we find that I < ∞. Since the dimensional- Magazine, 2016, 53(4):20-27.
ity of space A is d = 2, the path loss exponent ∂ should be set [15] D. Kapetanovic, G. Zheng, F. Rusek, ”Physical layer security for massive
to a value greater than 2. In fact, we set α = 3 to ensure that MIMO: An overview on passive eavesdropping and active attacks,” IEEE
Communications Magazine, 2015, 53(6):21-27.
the interference is infinite. Since the channel exhibits Rayleigh [16] X. Chen, C. Zhong, C. Yuen, et al, ”Multi-antenna relay aided wire-
fading and d = 2, we obtain the following: less physical layer security,” IEEE Communications Magazine, 2015,
53(12):40-46.
E[(hdb )γ ] = Γ(1 + γ) (A.8) [17] W. Trappe, ”The challenges facing physical layer security,” IEEE Com-
munications Magazine, 2015, 53(6):16-20.
and [18] Liu J, Nishiyama H, Kato N, et al,” On the Outage Probability of Device-
cd = πR2 = π, (A.9) to-Device-Communication-Enabled Multichannel Cellular Networks: An
RSS-Threshold-Based Perspective,” IEEE Journal on Selected Areas in
where cd is a unit circle and R = 1 in the two-dimensional Communications, 2016, 34(1):163-175.
[19] J. Yue, C. Ma, H. Yu, and W. Zhou, ”Secrecy-based access control for
space A. By substituting (A.8) and (A.9) into (A.7), we can device-to-device communication underlaying cellular networks,” IEEE
obtain the closed-form result for the Laplace transform given Communications Letters, vol. 17, no. 11, pp. 2068C2071, Nov. 2013.
0018-9545 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2017.2789022, IEEE
Transactions on Vehicular Technology
[20] W. He, W. Zhang, W. Bai, et al, ”Improving physical layer security Jiaming Liu received the B.S degree with major on
in underlay D2D communication via Stackelberg game based power Communication and Information System from Nan-
control,” International Conference on Computer, Information and T- jing University of Posts and Telecommunications,
elecommunication Systems, IEEE, 2016:1-5. China in 2016. He is currently a M.S student at Nan-
[21] F. Alavi, N. Yamchi, M. Javan, et al, ”Limited Feedback Scheme for jing University of Posts and Telecommunications,
Device to Device Communications in 5G cellular networks with Relia- China. His research interests include wireless multi-
bility and Cellular Secrecy Outage Constraints,” IEEE Transactions on media communication and physical-layer security in
Vehicular Technology, 2017, PP(99):1-1. wireless networks, etc.
[22] Y. Kwon, H. Suh, J. Oh, et al, ”Energy Efficient Communication for
Secure D2D Underlaid Cellular Networks,” IEEE Transactions on
Vehicular Technology, 2017, PP(99):1-1.
[23] D. Wang, B. Bai, W. Chen, et al, ”Achieving High Energy Efficiency
and Physical-Layer Security in AF Relaying,” IEEE Transactions on
Wireless Communications, 2016, 15(1):740-752.
[24] W. Wang, K. Teh, K. Li, ”Enhanced Physical Layer Security in D2D Mingkai Chen received the M. Sc. degree with ma-
Spectrum Sharing Networks,” IEEE Wireless Communications Letters, jor on Communication and Information System from
2017, 6(1):106-109. Fuzhou University, China in 2014. He is currently
[25] M. Haenggi, J. Andrews, F. Baccelli, et al, ”Stochastic geometry and a Ph. D student at Nanjing University of Posts and
random graphs for the analysis and design of wireless networks,” IEEE Telecommunications, China. His research interests
Journal on Selected Areas in Communications, 2009, 27(7):1029-1046. include wireless multimedia communication and re-
[26] F. Baccelli, A. Giovanidis, ”A Stochastic Geometry Framework for source allocation in wireless networks, etc.
Analyzing Pairwise-Cooperative Cellular Networks,” IEEE Transactions
on Wireless Communications, 2015, 14(2):794-808.
[27] H. Mustafa, M. Shakir, M. Imran, et al, ”Coverage Gain and Device-
to-Device User Density: Stochastic Geometry Modeling and Analysis,”
IEEE Communications Letters, 2015, 19(10):1742-1745.
[28] Y. Wang, Q. Zhu, ”Modeling and Analysis of Small Cells Based on
Clustered Stochastic Geometry,” IEEE Communications Letters, 2016,
PP(99):1-1.
[29] C. Wang, H. Wang, X. Xia, et al, ”Uncoordinated Jammer Selection Guan Gui received the Dr. Eng degree in Infor-
for Securing SIMOME Wiretap Channels: A Stochastic Geometry mation and Communication Engineering from U-
Approach,” IEEE Transactions on Wireless Communications, 2015, niversity of Electronic Science and Technology of
14(5):2596-2612. China (UESTC), Chengdu, China, in 2012. From
[30] X. Zhou, R. K. Ganti, J. G. Andrews, and A. Hj?rungnes, ”On the October 2009 to March 2014, he joined Department
throughput cost of physical layer security in decentralized wireless of Communications Engineering, Graduate School
networks,” IEEE Transactions on Wireless Communications, vol. 10, of Engineering, Tohoku University as for research
no. 8, pp. 2764-2775, Aug. 2011. assistant as well as postdoctoral research fellow,
[31] A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J. respectively. From April 2014 to October 2015, he
Merolla, ”Applications of LDPC codes to the wiretap channel,” IEEE was an Assistant Professor in Department of Elec-
Transactions on Information Theory, vol. 53, no. 8, pp. 2933-2945, Aug. tronics and Information System, Akita Prefectural
2007. University. Since November 2015, he has been a professor with Nanjing
[32] G. Amariucai, S. Wei, ”Active eavesdropping in fast fading channels: University of Posts and Telecommunications, Nanjing, China. He is currently
A Block-Markov Wyner secrecy encoding scheme,” IEEE Transactions engaged in research of deep learning, compressive sensing, and advanced
on Information Theory, 2012, 58(7):4660-4677. wireless techniques. He has published more than 150 papers in prestigious
[33] Y. Zou, X. Wang, W. Shen, ”Optimal Relay Selection for Physical-Layer peer-reviewed journals and conferences. Dr. Gui is the Editor (2017∼) of
Security in Cooperative Wireless Networks,” IEEE Journal on Selected IEEE Transactions on Vehicle Technology and KSII Transactions on Internet
Areas in Communications, 2013, 31(10):2099-2111. and Information Systems. He serves as the international chair for ICNC2018,
[34] Y. Zou, B. Champagne, W. Zhu, et al, ”Relay-Selection Improves TPC members for many conferences such as GLOBECOM, ICC and VTC.
the Security-Reliability Trade-Off in Cognitive Radio Systems,” IEEE He received ICC Best Paper Award in years 2014 and 2017, as well as IEEE
Transactions on Communications, 2015, 63(1):215-228. VTC-spring Best Student Paper Award in year 2014. He is an IEEE Senior
[35] Boyd, Vandenberghe, Faybusovich,” Convex Optimization,” IEEE Trans- Member.
actions on Automatic Control, 2006, 51(11):1859-1859.
0018-9545 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.