Computer Science ›› 2019, Vol. 46 ›› Issue (5): 100-104.doi: 10.11896/j.issn.1002-137X.2019.05.015

Previous Articles     Next Articles

Anti-eavesdropping Physical Layer Transmission Scheme Based on Time-reversal in D2D Communication Link

LI Fang-wei, ZHOU Jia-wei, ZHANG Hai-bo   

  1. (College of Communication and Information Engineering,Chongqing University of Posts and Telecommunications,Chongqing 400065,China)
  • Received:2018-04-22 Revised:2018-07-28 Published:2019-05-15

Abstract: In view of the physical layer security problem that the communication information between D2D users is easy to be bugged,a transmission scheme based on time inversion (TR) technology was proposed to improve the safety rate.Firstly,the MISO wiretapping channel model is created,and TR technology on D2D link is used to improve system safety rate due to TR technology’s spatiotemporal focusing characteristics.Secondly,an interference cooperation mechanism is designed to guarantee the security rate of the system.In this mechanism,the Stackelberg game auction model is established to guarantee the help of the interference users to the D2D users,and the existence of the Nash equilibrium (NE) of the game model is proved.In the end,the simulation results show thatthe proposed safe transmission scheme improves the safety rate performance effectively compared with the existing physical layer transmission scheme.

Key words: D2D, Nash equilibrium, Safe rate, Stackelberg game, Time-reversal

CLC Number: 

  • TN929.5
[1]MUTHANNA A,MASEK P,HOSEK J,et al.Analytical Eva-luatation of D2D Connectivity Potential in 5G Wireless Systems∥International Conference on Next Generation Wired/wireless Networking.Springer International Publishing,2016.
[2]WANG M,YAN Z.Security in D2D Communications:A Review∥IEEE Trustcom/bigdatase/ispa.IEEE Computer Society,Helsinki,2015:1199-1204.
[3]QINA Z,WANG X.Reviews of D2D technology for 5G communication networks.Journal on Communications,2016,129:1-14.
[4]BANAGAR M,MAHAM B,POPOVSKI P,et al.Power Distribution of Device-to-Device Communications in UnderlaidCellular Networks.IEEE Wireless Communications Letters,2015,5(2):204-207.
[5]LUO Y,CUI L,YANG Y,et al.Power control and channel access for physical-layer security of D2D underlay communication∥International Conference on Wireless Communications & Signal Processing.Nanjing:IEEE Press,2015:1-5.
[6]LIU G,FENG W,HAN al.Performance Analysis and Optimization of CooperativeFull-Duplex D2D CommunicationUnderlaying Cellular Networks.
[7]KANG X L,JI X S,HUANG K Z.SecureD2D underlaying cellular communication based on artificial noise assisted.Journal of communications,2015,36(10):149-156.
[8]DOPPLER K,RINNE M P,PEKKA,et al.Device-to-DeviceCommunications;Functional Prospects for LTE-Advanced Networks∥IEEE International Conference on Communications Workshops.Dresden:IEEE,2009:1-6.
[9]WANG L,WU H,STUBER G.Resource Allocation with Coope-rative Jamming in Socially Interactive Secure D2D Underlay∥IEEE Vehicular Technology Conference.Nanjing:IEEE Press,2016.
[10]CHEN Y,JI X,HUANG K,et al.Secrecy analysis in D2D-enabled cellular networks against spatially random eavesdroppers∥International Symposium on Wireless Personal Multimedia Communications.Shenzhen:IEEE Press,2017:262-267.
[11]QIU R C.A Theory of Time-Reversed Impulse Multiple-InputMultiple-Output (MIMO) for Ultra-Wideband (UWB) Communications∥IEEE 2006 International Conference on Ultra-Wideband.Waltham,MA,USA:IEEE,2007:587-592.
[12]QI X L,HUGHES T L,ZHANGS C.Topological field theory of time-reversal invariant insulators.Physical Review B,2008,78(19):195424.
[13]LI F W,ZHANG L L,ZHU J.A Mechanism of Radio Resource Optimization in Time-reversal Device-to-Device Communication .Journal of computer science,2017,45(10):78-82,98.(in Chinese)李方伟,张琳琳,朱江.D2D通信网络中一种基于时间反演的无线资源优化机制.计算机科学,2017,45(10):78-82,98.
[14]ZHU J ,WANG Y ,YANG T,et al.Time-Reversal Based Secure Transmission Scheme for 5G Networks over Correlated Wireless Multi-Path Channels.
[15]TRAN H V,TRAN H,KADDOUM G,et al.Effective secrecy-SINR analysis of time reversal employed systems over correlated multi-path channel∥The 11th International Conference on Wireless and Mobile Computing,Networking and Communications.Abu Dhabi:IEEE Press,2015:527-532.
[16]XU Q,REN P,DU Q,et al.Security-Aware Waveform and Artificial Noise Design for Time-Reversal-Based Transmission .IEEE Transactions on Vehicular Technology,2018,PP(99):1.
[17]FOUDA A E,TEIXIERA F L,YAVUZ M E.Time-reversaltechniques for MISO and MIMO wireless communication systems .
[1] JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339.
[2] YUAN Wei-lin, LUO Jun-ren, LU Li-na, CHEN Jia-xing, ZHANG Wan-peng, CHEN Jing. Methods in Adversarial Intelligent Game:A Holistic Comparative Analysis from Perspective of Game Theory and Reinforcement Learning [J]. Computer Science, 2022, 49(8): 191-204.
[3] XU Hao, CAO Gui-jun, YAN Lu, LI Ke, WANG Zhen-hong. Wireless Resource Allocation Algorithm with High Reliability and Low Delay for Railway Container [J]. Computer Science, 2022, 49(6): 39-43.
[4] ZHANG Jie, YUE Shao-hua, WANG Gang, LIU Jia-yi, YAO Xiao-qiang. Multi-agent System Based on Stackelberg and Edge Laplace Matrix [J]. Computer Science, 2021, 48(8): 253-262.
[5] LI Shao-hui, ZHANG Guo-min, SONG Li-hua, WANG Xiu-lei. Incomplete Information Game Theoretic Analysis to Defend Fingerprinting [J]. Computer Science, 2021, 48(8): 291-299.
[6] YUAN De-yu, CHEN Shi-cong, GAO Jian, WANG Xiao-juan. Intervention Algorithm for Distorted Information in Online Social Networks Based on Stackelberg Game [J]. Computer Science, 2021, 48(3): 313-319.
[7] BAO Jun-bo, YAN Guang-hui, LI Jun-cheng. SIR Propagation Model Combing Incomplete Information Game [J]. Computer Science, 2020, 47(6): 230-235.
[8] MENG Li-min, WANG Kun, ZHENG Zeng-qian, JIANG Wei. Architecture Strategy of D2D Content Edge Cache Based on Particle Swarm Optimization [J]. Computer Science, 2020, 47(11A): 345-348.
[9] ZHAI Yong, LIU Jin, LIU Lei, CHEN Jie. Analysis of Private Cloud Resource Allocation Management Based on Game Theory in Spatial Data Center [J]. Computer Science, 2020, 47(11A): 373-379.
[10] ZHANG Hui-juan, ZHANG Da-min, YAN Wei, CHEN Zhong-yun, XIN Zi-yun. Throughput Optimization Based Resource Allocation Mechanism in Heterogeneous Networks [J]. Computer Science, 2019, 46(10): 109-115.
[11] CHI Kai-kai, TANG Ze-feng, ZHU Yi-nan, SHAO Qi-ke. Efficient Multicast Schemes for D2D Multicast Cluster in Wireless Cellular Network [J]. Computer Science, 2019, 46(1): 169-174.
[12] LI Fang-wei HUANG Xu ZHANG Hai-bo LIU Kai-jian HE Xiao-fan. Cluster-based Radio Resource Allocation Mechanism in D2D Networks [J]. Computer Science, 2018, 45(9): 123-128.
[13] ZENG Jin-song, RAO Yun-bo. Intelligent Classification of Massive Information Based on Conflict Game Algorithm [J]. Computer Science, 2018, 45(8): 208-212.
[14] RAN Zheng, LUO Lei, YAN Hua, LI Yun. Nash Equilibrium Based Method for Mapping AUTOSAR Tasks to Multicore ECU [J]. Computer Science, 2018, 45(6): 166-171.
[15] ZHANG Pan-pan, PENG Chang-gen, HAO Chen-yan. Privacy Protection Model and Privacy Metric Methods Based on Privacy Preference [J]. Computer Science, 2018, 45(6): 130-134.
Full text



No Suggested Reading articles found!