通信学报 ›› 2016, Vol. 37 ›› Issue (8): 86-94.doi: 10.11959/j.issn.1000-436x.2016159

• 学术论文 • 上一篇    下一篇

基于安全中断概率的D2D安全接入策略

陈亚军1,季新生1,2,3,黄开枝1,康小磊1   

  1. 1 国家数字交换系统工程技术研究中心,河南 郑州 450002
    2 东南大学移动通信重点实验室,江苏 南京 211189
    3 移动互联网安全技术国家工程实验室,北京 100876
  • 出版日期:2016-08-25 发布日期:2016-09-01
  • 基金资助:
    国家高技术研究发展计划(“863”计划)基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目;东南大学移动国家重点实验室开放研究基金资助课题

Secrecy outage probability based access strategy for device-to-device communication underlaying cellular networks

Ya-jun CHEN1,Xin-sheng JI1,2,3,Kai-zhi HUANG1,Xiao-lei KANG1   

  1. 1 National Digital Switching System Engineering and Technological Research Center,Zhengzhou 450002,China
    2 National Mobile Communications Research Laboratory,Southeast University,Nanjing 211189,China
    3 National Engineering Lab for Mobile Networking Security,Beijing 100876,China
  • Online:2016-08-25 Published:2016-09-01
  • Supported by:
    The National High Technology Research and Development Program of China (863 Program);The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Open Research Fundation of National Mobile Communications Research Laboratory,Southeast University

摘要:

针对D2D蜂窝系统通信安全性受资源限制的问题,考虑到蜂窝链路和D2D链路的同频干扰能够为两者带来安全增益,基于此,提出一种基于安全中断概率的D2D用户接入策略。首先理论分析了蜂窝用户和D2D用户的安全中断概率,并给出了基于安全中断概率最小化的 D2D 用户功率优化算法。在上述分析的基础上,选择安全中断概率最小的D2D用户接入复用蜂窝用户的无线资源,同时提高D2D通信链路和蜂窝上行链路的安全性。最后,仿真结果证明了所提算法的有效性。

关键词: D2D通信, 物理层安全, 中断概率, 功率优化, 安全接入

Abstract:

A secure access strategy for D2D (device-to-device) communications underlaying cellular networks based on the secrecy outage probability was proposed.Firstly,the secrecy outage probability in the worst case was derived and a transmission power optimization scheme for D2D pairs was given.An access control strategy was further presented to allow the D2D pair with the minimum secrecy outage probability to reuse the cellular resource,which improved the se-cure communications for D2D links and cellular uplinks.Finally,simulation results showed that the proposed scheme was effective.

Key words: D2D communications, physical layer security, secrecy outage probability, power optimization, secure access

No Suggested Reading articles found!