1. Introduction and Related Work
In recent years, D2D-enabled cellular networks have attracted widely attentions due to their advantages including increasing spectrum efficiency and cellular capacity, offloading traffic[1-3]. Consequently, D2D communications are emerging as a potentially important technology component for 5G to satisfy ever-increasing demand for wireless services. However, as well as other wireless systems, D2D communications are more vulnerable to being eavesdropped by unauthorized users (Eavesdroppers) due to the inherent openness of the wireless channel.
To overcome this issue, physical-layer security (PLS) [4-9] has been recently proposed to employ the opening characters of wireless channels to achieve secret communication, resulting in achieving "absolute" security from the concept of information theory. There has been some work to exploit PLS for D2D communications. Security threats were analyzed for D2D communications underlaying LTE-A cellular networks in [10]. D2D mode having more advantages in reducing the interruption probability was depicted in [11]. The interference caused by D2D communications against Eves was exploited in [12-14]. To the best of our knowledge, the security requirement of D2D pairs remains elusive. The authors take the interference caused by D2D links against eavesdroppers in [12-14]. Unfortunately, the eavesdropper may have the most powerful ability to distinguish superimposition signals by successive interference cancellation [15]. The secure uplink communication has not been studied in this worst case, which is even harder to achieve due to the uplink limitations, such as terminals having no multi-antennas. But the downlink has a rich collection of resources, especially for 5G with the full-duplex and Massive MIMO (multiple-input multiple-output). So, we need to fully exploit that how we utilize the downlink redundant to guarantee the secure uplink communication.
On the other hand, the full-duplex transmission, which can transmit and receive signals simultaneously on the same frequency band, has received much attention recently [16-17]. Breakthroughs in self-interference mitigation techniques [18-19] make the full-duplex transmission being attracted tremendous attention. In [20-22], the authors exploit the full-duplex transmission to guarantee the secure communication in different scenarios.
Inspired by the prior works, an artificial noise-enabled secure transmission scheme is proposed for D2D-enabled cellular networks, which can guarantee the secure communication for both cellular users and D2D users simultaneously. The full-duplex base station transmits the artificial noise when it receives signals of cellular uplinks to guarantee their secure communications for both cellular links and D2D links. Furthermore, a secure power allocation scheme to maximize the overall secrecy rate is presented subject to the security requirement of cellular users. Unfortunately, the original power optimization problem is non-convex. To efficiently solve it, we recast the original problem into a convex program by utilizing proper relaxation and the successive convex approximation algorithm. Simulation results evaluate the effectiveness of the proposed scheme. Specially, our contributions can be summarized as follows:
1) In order to fully exploit that how we utilize the downlink redundant to guarantee the secure uplink communication, we propose an artificial noise-enabled secure transmission scheme for D2D-enabled cellular networks, which can guarantee the secure communication for different users.
2) Furthermore, based on the proposed secure transmission scheme, we can find that improving the transmission power of cellular users or D2D pairs will degrade the secrecy rate of the other kind user, although it will improve itself secrecy rate obviously. Hence, we formulate a secure power allocation problem, which maximizes the overall secrecy rate subject to the security requirement of cellular users.
3) Unfortunately, the original power optimization problem is non-convex. To efficiently solve it, we recast the original problem into a convex program by utilizing proper relaxation and the successive convex approximation algorithm. Simulation results evaluate the effectiveness of the proposed scheme.
We use the following notations in this paper. Bold letters denote matrices or vectors. We use ( ) 2 CN µ σ, to denote the circularly symmetric complex Gaussian noise with mean µ and variance 2 σ . [ ] + • is the maximum value compared with zero (i.e., [ ] max ,0 { } + •= • ). • returns the Frobenius norm of a vector or matrix. • denotes the mold of a complex number. ∇f x( ) and ( ) 2 ∇ f x are the gradient and Hess matrix of the function f x( ) , respectively. We write for equality in definition.
2. System Model and Problem Formulation
2.1 System Model
Fig. 1. System Model
The proposed system model for D2D secure communication underlaying full-duplex cellular networks is shown in Fig. 1, where there is a base station, a traditional cellular user, a D2D pair and an eavesdropper Eve. The D2D pair DD1 is comprised of a transmitter node T and an intended destination node D . The service of the cellular user is provided through the base station. Meanwhile, one D2D pair attempts to use the same cellular resource to establish the direct link between its transmitter node and its destination node. The eavesdropper Eve tries to overhear the signals of all users. It is assumed that Eve works in a passive way. The full-duplex base station is equipped with multi-antennas for sending and receiving signals simultaneously. Furthermore, it is assumed that the number of downlink transmission antennas must satisfy \(N_{t} \geq \max \left\{N_{r}, 2\right\}\) , where Nr is the reception antennas number. All the users are equipped with single antenna. We allow at most one D2D user to share the same channel with the given cellular user. Let 1 p and 2 p be the transmission power of the cellular user and D2D pair, respectively. Then, we denote \(\boldsymbol{P}=\left[p_{1}, p_{2}\right]^{T}\) for simplicity.s
Furthermore, in order to achieve secure communication for legitimate users, the full-duplex base station will transmit the artificial noise to disturb the passive Eve [23], while receiving the uplink cellular signals.
The received signals at the base station, the destination node D of the D2D pair and Eve can be, respectively, represented as:
\(y_{B}=\sqrt{p_{1}} \boldsymbol{H}_{C B} \boldsymbol{x}^{c}+\sqrt{p_{2}} \boldsymbol{H}_{D B} x^{d}+\sqrt{\rho P_{B}} \boldsymbol{H}_{B} \boldsymbol{w} \boldsymbol{s}+n_{b}\) (1)
\(y_{D}=\sqrt{p_{2}} H_{D} x^{d}+\sqrt{p_{1}} H_{C D} x^{c}+\sqrt{P_{B}} \boldsymbol{H}_{B D} \boldsymbol{w} \boldsymbol{s}+n_{d}\) (2)
\(y_{E}=\sqrt{p_{1}} H_{C E} x^{c}+\sqrt{p_{2}} H_{D E} x^{d}+\sqrt{P_{B}} \boldsymbol{H}_{B E} \boldsymbol{w} \boldsymbol{s}+n_{e}\) (3)
where \(\boldsymbol{H}_{c s}, \quad H_{c D}, \quad H_{D}, \quad \boldsymbol{H}_{s D}, \quad \boldsymbol{H}_{D s}, \quad H_{c \varepsilon}, \quad H_{D E}, \quad \boldsymbol{H}_{s}\) and denote the channel gains for \(C \rightarrow B, C \rightarrow D, T \rightarrow D, B \rightarrow D, T \rightarrow B, C \rightarrow E, T \rightarrow E, B \rightarrow B, B \rightarrow E\)respectively. is the artificial noise power of the full-duplex base station. nc,nd and ne denote the additive gaussian noise at the base station, the destination node and Eve with the distribution , respectively. xc and xd are the confidential information for the legitimate base station and destination node. s is a noise vector artificially generated by the base station to confuse Eve. w is the transmit weight vector corresponding to s. The effect of the self-interference suppression is modeled as the parameter \(\rho(\rho \in[0,1])\), especially, where \(\rho=0\) refers to the ideal case with no self-interference. In order to avoid the interference caused by the artificial noise, the artificial noise is designed within the null space of the joint channels, which could be denoted as \(\left[\boldsymbol{H}_{s}, \boldsymbol{H}_{s D}\right] w \boldsymbol{s}=\boldsymbol{\theta}\). That is to say, there is no self-interference generated by the artificial noise for base station.
We consider a worst case where the eavesdropper has powerful multi-user decidability. In other words, the eavesdropper could distinguish every data stream. Thus, they could subtract the interference induced by the information-bearing signals by employing multiuser detection techniques, just as done in [15]. Hence, there is no other interference when Eve chooses one of the received signals to overhear in this worst case, the achievable secrecy rates for the cellular user and the D2D tranmitter are given in (4) and (5),
\(C_{C}=\left[\log _{2}\left(1+\frac{p_{1}\left\|\boldsymbol{H}_{C B}\right\|^{2}}{\delta^{2}+p_{2}\left\|\boldsymbol{H}_{D B}\right\|^{2}}\right)-\log _{2}\left(1+\frac{p_{1}\left|H_{C E}\right|^{2}}{\delta^{2}+P_{B}\left\|\boldsymbol{H}_{B E}\right\|^{2}}\right)\right]^{+}\) (4)
\(C_{D}=\left[\log _{2}\left(1+\frac{p_{2}\left|H_{D D}\right|^{2}}{\delta^{2}+p_{1}\left|H_{C D}\right|^{2}}\right)-\log _{2}\left(1+\frac{p_{2}\left|H_{D E}\right|^{2}}{\delta^{2}+P_{B}\left\|\boldsymbol{H}_{B E}\right\|^{2}}\right)\right]^{+}\) (5)
In the practical system, the channel state information of the passive eavesdropper is very difficult to be obtained. Hence, we use the ergodic secrecy rates of the cellular users and D2D users to characterize their respective security performances, which are denoted as \(\bar{C}_{c}=\mathbb{E}_{H_{C E} H_{s \xi}}\left\{C_{c}\right\}\) and \(\bar{C}_{D}=\mathbb{E}_{H_{D E} H_{m r}}\left\{C_{D}\right\}\) . Furthermore, the sum ergodic secrecy rate is used to judge the security performance of this hybrid network in the above scenario.
2.2 Problem Formulation
The sum ergodic secrecy rate can be expressed as:
\(C=\bar{C}_{C}+\bar{C}_{D}\) (6)
When the secrecy rates in (4), (5) are positive values, substituting (4) and (5) into (6), we can obtain:
\(\begin{array}{l}C=\log _{2}\left(1+\frac{p_{1}\left\|\boldsymbol{H}_{C B}\right\|^{2}}{\delta^{2}+p_{2}\left\|\boldsymbol{H}_{D B}\right\|^{2}}\right)-\mathbb{E}_{H_{C E}, \boldsymbol{H}_{B E}}\left\{\log _{2}\left(1+\frac{p_{1}\left|H_{C E}\right|^{2}}{\delta^{2}+P_{B}\left\|\boldsymbol{H}_{B E}\right\|^{2}}\right)\right\} \\+\log _{2}\left(1+\frac{p_{2}\left|H_{D}\right|^{2}}{\delta^{2}+p_{1}\left|H_{C D}\right|^{2}}\right)-\mathbb{E}_{H_{D E} \boldsymbol{H}_{B E}}\left\{\log _{2}\left(1+\frac{p_{2}\left|H_{D E}\right|^{2}}{\delta^{2}+P_{B}\left\|\boldsymbol{H}_{B E}\right\|^{2}}\right)\right\}\end{array}\) (7)
From (7), we can find that their transmission power will directly determine their security performance. For instance, improving the transmission power of the cellular user will improve itself secrecy rate obviously. However, it will degrade the ergodic secrecy rate of the D2D pair. It will be the same when the D2D transmission power is improved. Therefore, each user should carefully choose its transmission power to maximize the sum secrecy rate for this hybrid network. On the other hand, the interference from D2D links reused the same resource with cellular users will degrade the communication quality of the cellular user. Hence, we must firstly guarantee the performance of the cellular user before allowing the D2D transmitter node to reuse its same resource. In summary, to maximize the sum secrecy rate, the power optimization problem can be formulated as:
\(\begin{aligned}&\max _{P} C\\&s . t \\&\mathrm{Cl}: C_{C} \geq \beta\\&\mathrm{C} 2: 0 \leq p_{1} \leq P_{1}^{\max }\\&\mathrm{C} 3: 0 \leq p_{2} \leq P_{2}^{\max }\end{aligned}\) (8)
Since the function is non-convex, the optimization problem in (8) is a non-convex programming problem for both and , which is difficult to directly derive the global optimal solution. In order to get the optimal transmission power, we must firstly convert the original problem to an equivalent convex optimization problem which would be easy to be solved. To solve the non-convex programming problem in (8), next we will firstly convert it to be a concave function.
3. Joint Power Optimization
Next, we firstly design a suboptimal solution to handle the non-convex power optimization problem in (8) with the appropriate relaxation and the SCA algorithm [18]. After converting the optimization problem in (8) to two strictly convex optimization problems, we further present a joint iterative power optimization algorithm for both the cellular user and D2D transmitter node.
3.1 SCA Algorithm
Firstly, we briefly introduce its core idea of the SCA algorithm, which could convert the non-convex constraint in the original problem to the conservative convex constraint. Then, the original problem can be solved by the converted convex problem recursively. The details could be found in [24]. Here, we just explain the SCA algorithm mathematically.
It is assumed that there is a non-convex constraint \(g(\psi) \leq 0\) in an optimization problem. Now we mainly need to change the non-convex constraint \(g(\psi) \leq 0\) with the SCA algorithm to solve the original problem as follow. Firstly, it assumed that we find a convex upper bound function of \(g(x)\) , denoted as \(G(\psi, \zeta)\) , where the parameter \(\xi\) is given. In addition, the convex upper bound function should hold that when \(\zeta=\varphi(\psi)\):
\(\begin{aligned}&g(\psi)=G(\psi, \varphi(\psi))\\&\nabla g(\psi)=\nabla G(\psi, \varphi(\psi))\end{aligned}\) (9)
where \(\nabla g(\psi)\) denotes the gradient of \(g(\psi)\) . Then, in \(n-t h\) recursive, the non-convex function \(g(\psi)\) is replaced by the convex function \(G\left(\psi, \zeta^{(n)}\right)\) . That is to say, we use the convex constraints \(G(\psi, \zeta) \leq 0\) to replace the original non-convex constraints \(g(\psi) \leq 0\) . In the \(n-t h\) recursive, the parameter \(\zeta^{(n)}\) updates with the optimal solution \(\psi^{(n-1)}\) in the \((n-1)-t h\) recursive, i.e. :\(\zeta^{(n)}=\varphi\left(\psi^{(n-1)}\right)\) .
3.2 Power Optimization for the Cellular User
To optimize the transmission power of the cellular user, we fistly assume the one of the D2D transmitter node is a constant. For simplicity, we define \(A_{1}=\left\|\boldsymbol{H}_{c s}\right\|^{2}, B_{1}=\left|H_{C E}\right|^{2}\) Thus, (7) can be rewritten as:
\(C=\log _{2}\left(1+\frac{p_{1} A_{1}}{\delta^{2}+p_{2} C_{1}}\right)-\log _{2}\left(1+\frac{p_{n, 1} B_{1}}{\delta^{2}+D_{1}}\right)+\log _{2}\left(1+\frac{p_{2} A_{2}}{\delta^{2}+p_{1} C_{2}}\right)-\log _{2}\left(1+\frac{p_{2} B_{2}}{\delta^{2}+D_{1}}\right)\) (10)
Then, the first constraint C1 in (8) can be rewritten as:
\(\log _{2}\left(1+\frac{p_{1} A_{1}}{\delta^{2}+p_{2} C_{1}}\right)-\log _{2}\left(1+\frac{p_{1} B_{1}}{\delta^{2}+D_{1}}\right) \geq \beta\) (11)
We can obtain:
\(p_{1} \geq \frac{\left(2^{\beta}-1\right)\left(\delta^{2}+p_{2} \cdot C_{1}\right)\left(\delta^{2}+D_{1}\right)}{A_{1} \cdot\left(\delta^{2}+D_{1}\right)-2^{\beta} \cdot B_{1} \cdot\left(\delta^{2}+p_{2} \cdot C_{1}\right)}\) (12)
From (12), we can see that it is a convex constraint. Next, we must convert the function in (10) to be a concave one, whose difficulty is how to relax the function where . A number of lower-bounds having the concave property could relax to be a concave function with respect to . However, the tighter of the lower-bound, the faster the lower-bound converges to a KKT point of the original problem. We need to derive and apply the tightest relaxation of to obtain the optimal solution for the optimization problem. The following Lemma 1[25] gives the tightest lower-bound of the function .
Lemma 1:The very tight lower-bound of where can be given by
\(\alpha \log _{2} z+\beta\) (13)
where the lower-bound coefficients and are denoted as:
\(\left\{\begin{array}{l}\alpha=\frac{z_{0}}{1+z_{0}} \\\beta=\log _{2}\left(1+z_{0}\right)-\frac{z_{0}}{1+z_{0}} \log _{2} z_{0}\end{array}\right.\) (14)
where is a positive real number. We can find that the lower-bound equals to at . More details, such the update of the lower-bound coefficients, are discussed in [25].
Based on Lemma1, we can get the tightest lower-bound of the third term in (10) as follows:
\(G_{1}\left(p_{1}\right) \approx \frac{1}{\ln 2}\left(\alpha_{1} \ln \left(A_{2} \cdot p_{2}\right)-\alpha_{1} \ln \left(\delta^{2}+C_{2} \cdot p_{1}\right)+\beta_{1} \ln 2\right)\) (15)
Then, using the logarithmic change of the variable , we can convert the to the log-sum-exp function denoted by , as follows:
\(G_{1}\left(\bar{p}_{1}\right) \approx \frac{1}{\ln 2}\left(\alpha_{1} \ln \left(A_{2} \cdot p_{2}\right)-\alpha_{1} \ln \left(\delta^{2}+C_{2} \cdot e^{\bar{p}_{1}}\right)+\beta_{1} \ln 2\right)\) (16)
is non-convex since is strictly convex. When the third term in (10) is replaced by (16), we assume that the objective function is denoted as .
On the other hand, when \(\bar{p}_{1}=\ln \left(p_{1}\right)\) , we can convert the second term in (10) to , which is also non-convex function and the fourth term has no variable . Hence, the difficulty to convert the original problem to be a convex problem is how we convert the first term in (10) to a non-convex function.
The first term in (10) can be expressed as by adding the auxiliary variable \(\eta\) :
\(\begin{aligned}&\max _{p_{1}} \bar{C}\\&\text {s.t} \\&\mathrm{Cl}: p_{1} \geq \frac{\left(2^{\beta}-1\right)\left(\delta^{2}+p_{2} \bullet C_{1}\right)\left(\delta^{2}+D_{1}\right)}{A_{1} \bullet\left(\delta^{2}+D_{1}\right)-2^{\beta} \cdot B_{1} \bullet\left(\delta^{2}+p_{2} \cdot C_{1}\right)}\\&\mathrm{C} 2: 0 \leq p_{1} \leq P_{1}^{\max }\\&\mathrm{C} 3: \log _{2}\left(1+\frac{p_{1} A_{1}}{\delta^{2}+p_{2} C_{1}}\right) \geq \eta,(\eta \geq 0)\end{aligned}\) (17)
where the C3 constraint is a non-convex constraint, which also can be expressed as \(p_{1}-\frac{\delta^{2}+p_{2} C_{1}}{A_{1}}\left(2^{\eta}-1\right) \leq 0\). We denote it as \(F\left(p_{1}, \eta\right)=p_{1}-\frac{\delta^{2}+p_{2} C_{1}}{A_{1}}\left(2^{\eta}-1\right)\) , which is a non-convex function because its Hesse matrix is a negative semidefinite one, \(\text { i.e., } \nabla^{2} F\left(p_{1}, \eta\right) \leq 0\) . Therefore, we deal with it SCA algorithm.
The first-order Taylor expression of \(f(\eta)=\left(2^{\eta}-1\right)\) at \(\xi\) is:
\(\begin{aligned}f_{1}(\eta, \xi) & \triangleq f(\xi)+\nabla f(\xi)(\eta-\xi) \\&=2^{\xi}(1+\ln 2 \bullet(\eta-\xi))-1\end{aligned}\) (18)
We can easily get \(f_{1}(\eta, \xi)-f(\xi) \leq 0\) because of \(-\nabla^{2} f(\eta) \geq 0, F_{1}\left(p_{1}, \eta\right)=p_{1}-\frac{\delta^{2}+p_{2} C_{1}}{A_{1}} \cdot\left[2^{t}(1+\ln 2 \cdot(\eta-\xi))-1\right]\), is the convex upper bound of \(F\left(p_{1}, \eta\right)\) . On the other hand, it can be verified that \(F_{1}\left(p_{1}, \eta\right)\) hold the following equation when \(p_{1}=\xi\) :
\(\begin{aligned}&F\left(p_{1}, \eta\right)=F_{1}\left(p_{1}, \eta, \xi\right)\\&\nabla F\left(p_{1}, \eta\right)=\nabla F_{1}\left(p_{1}, \eta, \xi\right)\end{aligned}\) (19)
Thus, in the \(l-t h\) recursion, the C3 constraint in (17) can be replaced by the following convex constraint condition:
\(p_{1}-\frac{\delta^{2}+p_{2} C_{1}}{A_{1}} \cdot\left[2^{\xi^{(l)}}\left(1+\ln 2 \bullet\left(\eta-\xi^{(l)}\right)\right)-1\right] \leq 0\) (20)
where \(\xi^{(l)}=p_{1}^{(l-1)}\) and \(p_{1}^{(l-1)}\) is represented as the local optimal solution of the transmission power for the cellular user in the \((l-1)-t h\) recursive. Thus, the suboptimization problem (17) can be rewritten as:
\(\begin{aligned}&\max _{p_{1}} \bar{C}\\&\text {s.t}\\&\mathrm{Cl}: \exp \left(\tilde{p}_{1}\right) \geq \exp \left(\frac{\left(2^{\beta}-1\right)\left(\delta^{2}+p_{2} \cdot C_{1}\right)\left(\delta^{2}+D_{1}\right)}{A_{1} \cdot\left(\delta^{2}+D_{1}\right)-2^{\beta} \cdot B_{1} \cdot\left(\delta^{2}+p_{2} \cdot C_{1}\right)}\right)\\&\mathrm{C} 2: 0 \leq \exp \left(\tilde{p}_{1}\right) \leq P_{1}^{\max }\\&\mathrm{C} 3: \exp \left(\tilde{p}_{1}\right)-\frac{\delta^{2}+p_{2} C_{1}}{A_{1}} \cdot\left[2^{\xi^{(l)}}\left(1+\ln 2 \bullet\left(\eta-\xi^{(l)}\right)\right)-1\right] \leq 0\end{aligned}\) (21)
Hence, the optimization problem in (21) is a convex program, which can be efficiently solved by the standard convex solver, e.g., CVX. Table 1 gives the algorithm to solve the power optimization problem in (21) after the original optimization problem in (8) being handled by the relaxation and the SCA algorithm.
Table 1. Power optimization algorithm for the cellular user (21)
3.3 Power Optimization for the D2D transmitter node
We discuss how to get the local optimal solution of transmission power for the cellular user in the above subsection. Now we will substitute the obtained suboptimal from the above subsection into (10). Next we will only optimize the transmission power of the D2D transmitter node when it is assumed that the transmission power for the cellular user is fixed. Similarly, we use the same method discussed in the above subsection to optimize the D2D transmission power. Hence, it will not be explained in detail here.
We can see that the fourth term in (10) is a non-convex function and the second term has no the variable p2 . Based on the Lemma1, we can relax the first term (10) to be stated in (22), where \(\alpha\)2 , \(\beta\) 2are the lower-bound coefficients:
\(G_{2}\left(\bar{p}_{2}\right) \approx \frac{1}{\ln 2}\left(\alpha_{2} \ln \left(A_{1} \cdot p_{1}\right)-\alpha_{2} \ln \left(\delta^{2}+C_{1} \cdot e^{\bar{p}_{2}}\right)+\beta_{2} \ln 2\right)\) (22)
When the first term in (10) is replaced by (22), we denote the objective function as \(\overline{\bar{C}}\). Then, by adding the auxiliary variables , the third term in (10) can be expressed as:
\(\log _{2}\left(1+\frac{p_{2} A_{2}}{\delta^{2}+p_{1} C_{2}}\right) \geq t,(t \geq 0)\) (23)
We denote \(F_{2}\left(p_{2}, t\right)=p_{2}-\frac{\delta^{2}+p_{1} C_{2}}{A_{2}}\left(2^{\prime}-1\right)\) , which is a non-convex function because its Hesse matrix a negative semidefinite one, i.e.\(\nabla^{2} F_{2}\left(p_{2}, t\right) \leq 0\). Similarity, we also can get \(F_{3}\left(p_{2}, t\right)=p_{2}-\frac{\delta^{2}+p_{1} C_{2}}{A_{2}} \cdot\left[2^{\zeta}(1+\ln 2 \bullet(t-\zeta))-1\right]\) is the convex upper bound of \(F_{2}\left(p_{2}, t\right)\) .
On the other hand, it can be verified that \(F_{2}\left(p_{2}, t\right)\) hold the following equation when \(p_{2}=t\) :
\(\begin{aligned}&F_{2}\left(p_{2}, t\right)=F_{3}\left(p_{2}, t, \zeta\right)\\&\nabla F_{2}\left(p_{2}, t\right)=\nabla F_{3}\left(p_{2}, t, \zeta\right)\end{aligned}\) (24)
Thus, in the \(l-t h\) recursion, (23) can be replaced by the following convex constraint condition:
\(p_{2}-\frac{\delta^{2}+p_{1} C_{2}}{A_{2}} \cdot\left[2^{\zeta^{(l)}}\left(1+\ln 2 \bullet\left(t-\zeta^{(l)}\right)\right)-1\right] \leq 0\) (25)
where \(\zeta^{(l)}=p_{2}^{(l-1)}, p_{2}^{(l-1)}\) is represented as the local optimal solution of the transmission power for the D2D transmitter in the recursive. Hence, the suboptimizaiton problem can be expressed as:
\(\begin{array}&\max _{p_{2}} \overset{=}{C}\\\text {s.t}\\\mathrm{C} 1: 0 \leq \exp \left(\bar{p}_{2}\right) \leq P_{2}^{\max } \\\mathrm{C} 2: \exp \left(\bar{p}_{2}\right)-\frac{\delta^{2}+p_{1} C_{2}}{A_{2}} \cdot\left[2^{\zeta^{(l)}}\left(1+\ln 2 \bullet\left(t-\zeta^{(l)}\right)\right)-1\right] \leq 0\end{array}\) (26)
Similarity, the optimization problem in (26) is a convex program, which also can be solved by the standard convex solver, e.g., CVX. Because the algorithm is similar to the one to optimize the transmission power for the cellular user shown in Table 1, here we omit the specific procedure.
3.4 Joint Power Optimization Algorithm
From the above subsections, the original optimization problem (8) is divided two convex optimization subproblems to be solved after being handled by the relaxation and the SCA algorithm. Now in this subsection, the joint iterative transmission power optimization algorithm for both the cellular user and D2D transmitter node is proposed as follows:
Table 2. Joint power optimization algorithm (8)
Property 1 ( Convergence ):The proposed joint transmission power optimization algorithm converges to the equilibrium ergodic secrecy rate.
Proof Sketch: Now, we briefly analyze the convergence of the joint transmission power optimization algorithm in Table 2. The parameters and in the optimization problems (21) and (26) respectively satisfy (20) and (25) when they are updated. Therefore, the set of feasible solutions in recursive is a subset of the feasible solutions in the recursive. Consequently, the optimal target values in the recursive are at least less than the optimal ones in the recursive. In other words, the optimal values got by the optimization problems in (21) and (26) are non-decreasing. On the other hand, the ergodic secrecy rate of this hybrid network must have the upper bounds with the given transmission power. Based on the above analysis, the joint transmission power optimization algorithm in Table 2 is convergent.
4. Simulation Results
We present simulation results to prove the overall system performance under the proposed scheme. A simplified cellular network model is considered with the radius . Eve is in the cell subject to uniform distribution. We assumed that all the channels are the path loss model[26] . Simulation parameters are given in Table 3.
Table 3. Simulation Parameters
Fig. 2. Sum ergodic secrecy rate with noise power
Fig. 2 demonstrates the sum ergodic secrecy rate of different kinds of users with the proposed joint transmission power optimization algorithm under the different noise power, where the sum secrecy rate with their largest transmission power is also presented for comparison. As observed, it can see that the sum secrecy rate with the proposed algorithm is larger than that with the largest transmission power. In this paper, it is assumed that the eavesdropper has the powerful multi-user decidability, which could subtract the interference induced by the information-bearing signals from the cellular user and D2D transmitter node. Hence, the interference induced by the hybrid links reused the same resource will not degrade the eavesdropper's channel capacity.
What is more, as mentioned above in subsection 2.2, their security performances directly depends on their transmission power. Especially, improving the transmission power of the cellular user will improve itself secrecy rate obviously. However, it will degrade the ergodic secrecy rate of the D2D transmitter node. It will be in the same situation when the transmission power of the D2D transmitter node is improved. Therefore, the scheme with their largest transmission power may be not the optimal one from the perspective of the secrecy performance for this hybrid network. Thus, we should carefully design their transmission power to maximize the sum secrecy rate for this hybrid network. Compared with the largest transmission power, it could improve the overall secrecy performance with the optimal transmission power obtained by the proposed algorithm.
Fig. 3. Sum secrecy rate under iterative numbers
Fig. 3 shows the secrecy rate with the iterative number increasing when the noise power is -80dBm. As shown in Fig. 3, all secrecy rates converge to a stable value fast with the iterative number increasing. We can see that all the security rates have been stable when the iterative number is 4. Hence, we can conservatively conclude that the proposed scheme is effective and efficient.
Fig. 4. Sum ergodic secrecy rate with different noise powers compared with the half-duplex scheme
The sum ergodic secrecy rate for this hybrid network is presented in Fig. 4 under the different noise power compared with the traditional half-duplex scheme. The artificial noise designed within the null space of the joint channel from the full-duplex base station is injected into the downlink information-bearing signals while receiving uplink signals, resulting in only degrading the the channel capacity for the eavesdropper. As expected, the sum ergodic secrecy rate with the full-duplex base station is larger compared with the half-duplex scheme. In other word, the proposed secure transmission scheme based on the artificial noise under the full-duplex base station could improve its performance compared with the traditional half-duplex scheme.
Fig. 5. Sum ergodic secrecy rate with different distance between D2D pair under different noise powers
Furthermore, we exploit the impact of the distance between D2D pairs on the overall security performance. From Fig. 5, we can see that the sum ergodic secrecy rate of this hybrid network will be smaller with the distance between the D2D pair increasing. This is because the channel fading between the D2D pair will be more serious, the smaller the channel capacity with a larger distance between the D2D pair, resulting in a smaller sum ergodic secrecy rate.
5. Conclusion
A secure transmission scheme based on the artificial noise for D2D-enabled cellular networks was exploited in this paper. The full-duplex base station transmits the artificial noise to achieve secure communication for both the cellular user and D2D transmitter node when it receives signals of the cellular uplink. To maximize the overall secrecy rate for the hybrid work, a secure power allocation scheme is presented. However, the original optimization problem is non-convex. To solve it, we utilize the proper relaxation and the successive convex approximation algorithm to change the original optimization problem into a convex program problem. Finally, simulation results are conducted to evaluate the effectiveness of the proposed scheme. In the further work, we should fully study the full-duplex transmission gain to guarantee the secure communication in other scenarios.
References
- Fodor G, Roger S, Rajatheva N, et al., "An Overview of Device-to-Device Communications Technology Components in METIS," IEEE Access, vol.4, pp. 3288-3299, 2016. https://doi.org/10.1109/ACCESS.2016.2585188
- K. Doppler, M. Rinne, C. Wijting, et al., "Device to-device communication as an underlay to LTE-Advanced networks," IEEE Communication Magazine, vol.47, no.12, pp. 42-49, 2009. https://doi.org/10.1109/MCOM.2009.5350367
- G. Fodor, E. Dahlman, G. Mildh, et al., "Design aspects of network assisted device-to-device communications," IEEE Communication Magazine, vol.50, no.3, pp.170-77, 2012. https://doi.org/10.1109/MCOM.2012.6163598
- B. Li, Z. Fei, Z. Chu, Y. Zhang, "Secure Transmission for Heterogeneous Cellular Networks with Wireless Information and Power Transfer," IEEE Systems Journal, vol.12, no.4, pp. 3755-3766, 2018. https://doi.org/10.1109/JSYST.2017.2713881
- B. Li, Z. Fei, Z. Chu, et al., "Robust Chance-Constrained Secure Transmission for Cognitive Satellite-Terrestrial Networks," IEEE Transactions on Vehicular Technology, vol.67, no.5, pp.4208-4219, 2018. https://doi.org/10.1109/TVT.2018.2791859
- B. Li, Z. Fei, X. Xu, et al., "Resource Allocations for Secure Cognitive Satellite Terrestrial Networks," IEEE Wireless Communications Letters, vol.7, no.1, pp.78-81, 2018. https://doi.org/10.1109/LWC.2017.2755014
- B. Li, X. Qi, K. Huang, Z. Fei, F Zhou, R. Hu, "Security-Reliability Tradeoff Analysis for Cooperative NOMA in Cognitive Radio Networks," IEEE Transactions on Communications, vol.67, no.1, pp.83-96, 2019. https://doi.org/10.1109/TCOMM.2018.2873690
- Y. Chen, X. Ji, K. Huang, et al., "Opportunistic access control for enhancing security in D2D-enabled cellular networks," SCIENCE CHINA Information Sciences, vol. 61, no. 4, 042304:1-12, April. 2018.
- Z. Chu, F. Zhou, P. Xiao, Z. Zhu, et al., "Resource Allocation for Secure Wireless Powered Integrated Multicast and Unicast Services With Full Duplex Self-Energy Recycling," IEEE Transactions on Wireless Communications, vol. 18, no. 1, pp. 620-636, Jan. 2019. https://doi.org/10.1109/TWC.2018.2883563
- M. Alam, Y. Du, J. Rodriguez, et al., "Secure Device-to-Device Communication in LTE-A," IEEE Communications Magazine, vol.52, no.4, pp. 66-73, 2014. https://doi.org/10.1109/MCOM.2014.6807948
- D. Zhu, A. Swindlehurst, S. Fakoorian, et al., "Device-to-device communications: the physical layer security advantage," in Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, 1606-1610, 2014.
- H. Zhang, T. Wang, L. Song, et al., "Radio resource allocation for physical-layer security in D2D underlay communications," in Proc. of IEEE International Conference on Communications (ICC), Sydney, NSW, 2319-2324, 2014.
- J. Yue, C. Ma, Y. Hui, et al., "Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks," IEEE Communications Letters, vol.17, no.11, pp.2068-2071, 2013. https://doi.org/10.1109/LCOMM.2013.092813.131367
- J. Yue, C. Ma, H. Yu, et al., "Secrecy-based Channel Assignment for Device-to-Device Communication: An Auction Approach," in Proc. of IEEE International Conference on Wireless Communications & Signal Processing (WCSP), Hangzhou, China, 1-6, 2013.
- Y. Chen, X. Ji, K. Huang, et al., "Artificial noise-assisted physical layer security in D2D-enabled cellular networks," EURASIP Journal on Wireless Communications and Networking, 178, 2017.
- B. Day, A. Margetts, D. Bliss, and P. Schniter, "Full-duplex bidirectional MIMO: Achievable rates under limited dynamic range," IEEE Transactions on Signal Processing, vol.60, no.7, pp. 3702-3713, 2012. https://doi.org/10.1109/TSP.2012.2192925
- W. Cheng, X. Zhang, and H. Zhang, "Optimal dynamic power control for full-duplex bidirectional-channel based wireless networks," in Proc. of IEEE 32nd INFOCOM, Turin, Italy, 3120-3128, 2013.
- W. Afifi, M. Abdel-Rahman, M. Krunz, et al., "Full-Duplex or Half-Duplex: A Bayesian Game for Wireless Networks with Heterogeneous Self-Interference Cancellation Capabilities," IEEE Transactions on Mobile Computing, vol.17, no.5, pp.1076-1089, 2018. https://doi.org/10.1109/TMC.2017.2758785
- V. Nguyen, H. Nguyen, O. Dobre, "A New Design Paradigm for Secure Full-Duplex Multiuser Systems," IEEE Journal on Selected Areas in Communications, vol.36, no.7, pp. 1480-1498, 2018. https://doi.org/10.1109/JSAC.2018.2824379
- X. Ji, X. Kang, K. Huang, et al., "The full-duplex artificial noise scheme for security of a cellular system," China Communications, vol.12, no. Supplement, pp. 150-156, 2015.
- M. Li, Y. Guo, K. Huang, et al., "Secure power and subcarrier auction in uplink full-duplex cellular networks," China Communications, vol.12, Supplement, pp. 157-165, 2015. https://doi.org/10.1109/CC.2015.7386164
- G. Chen, Y. Gong, P. Xiao, et al., "Physical layer network security in the full-duplex relay system," IEEE Transactions on Information Forensics and Security, vol.10, no.3, pp. 574-583, 2015. https://doi.org/10.1109/TIFS.2015.2390136
- S. Goel, I. Negr, "Guaranteeing secrecy using artificial noise," IEEE Transactions on Wireless Communications, vol.7, no.6, pp. 2180-2189, 2008. https://doi.org/10.1109/TWC.2008.060848
- A. Beck, A. Ben-Tal, and L. Tetruashvili, "Application of the sequential parametric convex approximation method with application to nonconvex truss topology design problems," Journal of Global Optimizaiton, vol.47, no.1, pp. 29-51, 2010. https://doi.org/10.1007/s10898-009-9456-5
- W. Cheng, X. Zhang, H. Zhang, "Optimal Dynamic Power Control for Full-Duplex Bidirectional-Channel Based Wireless Networks," in Proc. of IEEE INFOCOM 2013, Turin, Italy, 3120-3128, 2013.
- L. Dong, Z. Han, A. Petropulu and H. Poor, "Improving Wireless Physical Layer Security via Cooperating Relays," IEEE Transactions on Signal Processing, vol.58, no.3, pp. 1875-1888, 2010. https://doi.org/10.1109/TSP.2009.2038412