2013
DOI: 10.4028/www.scientific.net/amm.441.951
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Security of D2D Communications Underlaying Cellular Networks

Abstract: In this paper, we propose a novel resource allocation criterion based on physical layer security, which means choosing the proper subcarrier to ensure the device to device (D2D) security capacity maximum based on guaranteeing the cellular users basic capacity. We analyze the relationship between D2D security capacity and D2D power. We also prove that the strategies based on the D2D secrecy rate maximum and cellular sum rate maximum are the same when the transmit SNR of BS is high enough. Through the numerical … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…Channel State Information (CSI) which refers to known channel properties of a wireless link can serve to extract secret keys from the measurement of the physical layer (Table 3). Recently, various CSI-based key extraction works have been proposed to secure D2D communications [23,32,[48][49][50][51][52][53][54][55][56]. Xi et al [48] proposed a fast secret key extraction protocol for D2D communication (KEEP), in which a validation-recombination mechanism is used to obtain symmetric secret keys from the CSI measurements of all orthogonal frequency division multiple subcarriers.…”
Section: Physical Layermentioning
confidence: 99%
See 2 more Smart Citations
“…Channel State Information (CSI) which refers to known channel properties of a wireless link can serve to extract secret keys from the measurement of the physical layer (Table 3). Recently, various CSI-based key extraction works have been proposed to secure D2D communications [23,32,[48][49][50][51][52][53][54][55][56]. Xi et al [48] proposed a fast secret key extraction protocol for D2D communication (KEEP), in which a validation-recombination mechanism is used to obtain symmetric secret keys from the CSI measurements of all orthogonal frequency division multiple subcarriers.…”
Section: Physical Layermentioning
confidence: 99%
“…In [51], a novel resource allocation based on the physical layer security has been proposed, in which a power and subcarrier allocation scheme maximises the D2D security capacity without influencing the cellular user's basic capacity. Jayasinghe et al have designed a secure beamforming technique to prevent eavesdropping on multiple-input multiple-output D2D communications via a trusted relay which performs physical layer network coding [52].…”
Section: Physical Layermentioning
confidence: 99%
See 1 more Smart Citation
“…This brings out new services, that was previously only accessible via computers, now are available on mobile devices for ecommerce applications and various other services. These applications require mobile users to be authenticated in order to use the services [25,27,28]. Researchers have discussed [26] that people buy cell phones because they are the best communication devices.…”
Section: Authentication and Key Agreement For Mobile Devices In An Ehmentioning
confidence: 99%
“…Though D2D communication has been a hot research topic in recent years, there is not much study focusing on the security aspect of D2D communications. [10] and [11] discuss the physical layer solutions for secure D2D communications, but their techniques are difficult to be implemented using devices on the market.…”
Section: Introductionmentioning
confidence: 99%