Abstract:This paper considers full-duplex (FD) device-todevice (D2D) communications in a downlink MISO cellular system in the presence of multiple eavesdroppers. The D2D pair communicate sharing the same frequency band allocated to the cellular users (CUs). Since the D2D users share the same frequency as the CUs, both the base station (BS) and D2D transmissions interfere each other. In addition, due to limited processing capability, D2D users are susceptible to external attacks. Our aim is to design optimal beamforming… Show more
“…Meanwhile, it also shows that the secure coverage probabilities for both users will decrease as β increases. Furthermore, from (9) and (13), it is shown that the CU's secure coverage probability is only relate to the relative position with UAV and their eavesdroppers, and the scope of communication area. While the secure coverage of DUs are affected by many parameters, as the impact of 0 Fig.…”
Section: Simulation Results and Analysismentioning
confidence: 99%
“…Under the circular-shaped UAV secure coverage, the formula (9) and (13) have shown that the CU's secure coverage probability is a function of both h and C R (but not of U P ). In this case, the mobile UAV is capable of both providing secure communication enhancement with variant h values and serving area after performing parameter adjustment.…”
Section: The Benefits Brought About By Employing Mobile Uavmentioning
confidence: 99%
“…The throughput of FD-mode D2D network have been discussed in [11], and the effects of residual SI and spectral efficiency are analyzed in [12]. In FD-mode D2D security communication, the BS can allocate a fraction of the total transmitted signal as artificial noise (AN) to degrade the eavesdroppers' channel, which can be employed for improving the security of the communications, but the FD-mode D2D only share the frequency band allocated to a CU by the BS [13]. In [14], the FD relay node receives the data and transmits jamming signals at the same time, which has the same data rate as the HD scheme but significant improving the secrecy performance, but it has not considered the D2D communication.…”
Section: Introductionmentioning
confidence: 99%
“…Unlike [15] in which the base station works in the FD mode, we allow the D2D (its receivers) to work in FD mode (e.g. like in [11]- [13], [16]) to prevent eavesdropping by transmitting jamming signals [14]. The closed form expression of the security capacity under the UAV coverage in UAV-based BS is derived, showing that the UAV-based solution not only enhance the CUs communication security, but also increase DUs' capacity (thus increase the system's sum capacity).…”
Unmanned aerial vehicles (UAVs), acting as mobile base stations (BSs), can be deployed in the typical fifth-generation mobile communications (5G) scenarios for the purpose of substantially enhancing the radio coverage. Meanwhile, UAV aided underlay device-to-device (D2D) communication mode can be activated for further improving the capacity of the 5G networks. However, this UAV aided D2D communication system is more vulnerable to eavesdropping attacks, resulting in security risks. In this paper, the D2D receivers work in full-duplex (FD) mode, which improves the security of the network by enabling these legitimate users to receive their useful information and transmit jamming signal to the eavesdropper simultaneously (with the same frequency band). The security communication under the UAV coverage is evaluated, showing that the system's (security) capacity can be substantially improved by taking advantage of the flexible radio coverage of UAVs. Furthermore, the closed-form expressions for the coverage probabilities are derived, showing that the cellular users (CUs)' secure coverage probability in downlink transmission is mainly impacted by the following three factors: its communication area, the relative position with UAV, and its eavesdroppers. In addition, it is observed that the D2D users or DUs' secure coverage probability is relevant to state of the UAV. The system's secure capacity can be substantially improved by adaptively changing the UAV's position as well as coverage.
“…Meanwhile, it also shows that the secure coverage probabilities for both users will decrease as β increases. Furthermore, from (9) and (13), it is shown that the CU's secure coverage probability is only relate to the relative position with UAV and their eavesdroppers, and the scope of communication area. While the secure coverage of DUs are affected by many parameters, as the impact of 0 Fig.…”
Section: Simulation Results and Analysismentioning
confidence: 99%
“…Under the circular-shaped UAV secure coverage, the formula (9) and (13) have shown that the CU's secure coverage probability is a function of both h and C R (but not of U P ). In this case, the mobile UAV is capable of both providing secure communication enhancement with variant h values and serving area after performing parameter adjustment.…”
Section: The Benefits Brought About By Employing Mobile Uavmentioning
confidence: 99%
“…The throughput of FD-mode D2D network have been discussed in [11], and the effects of residual SI and spectral efficiency are analyzed in [12]. In FD-mode D2D security communication, the BS can allocate a fraction of the total transmitted signal as artificial noise (AN) to degrade the eavesdroppers' channel, which can be employed for improving the security of the communications, but the FD-mode D2D only share the frequency band allocated to a CU by the BS [13]. In [14], the FD relay node receives the data and transmits jamming signals at the same time, which has the same data rate as the HD scheme but significant improving the secrecy performance, but it has not considered the D2D communication.…”
Section: Introductionmentioning
confidence: 99%
“…Unlike [15] in which the base station works in the FD mode, we allow the D2D (its receivers) to work in FD mode (e.g. like in [11]- [13], [16]) to prevent eavesdropping by transmitting jamming signals [14]. The closed form expression of the security capacity under the UAV coverage in UAV-based BS is derived, showing that the UAV-based solution not only enhance the CUs communication security, but also increase DUs' capacity (thus increase the system's sum capacity).…”
Unmanned aerial vehicles (UAVs), acting as mobile base stations (BSs), can be deployed in the typical fifth-generation mobile communications (5G) scenarios for the purpose of substantially enhancing the radio coverage. Meanwhile, UAV aided underlay device-to-device (D2D) communication mode can be activated for further improving the capacity of the 5G networks. However, this UAV aided D2D communication system is more vulnerable to eavesdropping attacks, resulting in security risks. In this paper, the D2D receivers work in full-duplex (FD) mode, which improves the security of the network by enabling these legitimate users to receive their useful information and transmit jamming signal to the eavesdropper simultaneously (with the same frequency band). The security communication under the UAV coverage is evaluated, showing that the system's (security) capacity can be substantially improved by taking advantage of the flexible radio coverage of UAVs. Furthermore, the closed-form expressions for the coverage probabilities are derived, showing that the cellular users (CUs)' secure coverage probability in downlink transmission is mainly impacted by the following three factors: its communication area, the relative position with UAV, and its eavesdroppers. In addition, it is observed that the D2D users or DUs' secure coverage probability is relevant to state of the UAV. The system's secure capacity can be substantially improved by adaptively changing the UAV's position as well as coverage.
“…These mechanisms take into account the locations of homogeneous spatial Poisson point processes for FD-D2D users. Moreover, there are other promising techniques being considered that coexist with FD-D2D, such as FD-D2D underlying cellular networks equipped with base station MIMO antennas, as explored in [20,21]. However, the previous studies typically concentrate on overall cell performance improvement, with only a limited number of works focusing on maximizing D2D link throughput, as discussed in [19].…”
D2D communication is a promising technology for enhancing spectral efficiency (SE) in cellular networks, and full-duplex (FD) has the potential to double SE. Due to D2D’s short-distance communication and low transmittance power, it is natural to integrate FD into D2D, creating FD-D2D to underlay a cellular network to further improve SE. However, the residual self-interference (RSI) resulting from FD-D2D and interference arising from spectrum sharing between D2D users (DUs) and cellular users (CUs) can restrict D2D link performance. Therefore, we propose an FD-D2D underlying cellular system in which DUs jointly share uplink and downlink spectral resources with CUs. Moreover, we present two algorithms to enhance the performance experience of DUs while improving the system’s SE. For the first algorithm, we tackle an optimization problem aimed at maximizing the sum rate of FD-DUs in the system while adhering to transmittance power constraints. This problem is formulated as a mixed-integer nonlinear programming problem (MINLP), known for its mathematical complexity and NP-hard nature. In order to address this MINLP, our first algorithm decomposes it into two subproblems: power control and spectral resource allocation. The power control aspect is treated as a nonlinear problem, which we solve through one-dimensional searching. Meanwhile, spectral resource allocation is achieved using the Kuhn–Munkres algorithm, determining the pairing of CUs and DUs sharing the same spectrum. As for the second algorithm, our objective is to enhance the individual performance of FD-DUs by maximizing the minimum rate among them, ensuring more uniform rate performance across all FD-DUs. In order to solve this optimization problem, we propose a novel spectral resource allocation algorithm based on bisection searching and the Kuhn–Munkres algorithm, whereas the power control aspect remains the same as in the first algorithm. The numerical results demonstrate that our proposed algorithm effectively enhances the performance of DUs in an FD-D2D underlying cellular network when compared to the sum rate maximization design.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.