DOI QR코드

DOI QR Code

Device-to-Device Communication Power Control Technique for Ensuring Communication Security of Cellular System

셀룰러 망 통신보안을 위한 D2D 통신 송신전력 제어 기법

  • Lee, Kisong (Department of Information and Telecommunication Engineering, Kunsan National University) ;
  • Hong, Jun-Pyo (Department of Information and Communications Engineering, Pukyong National University)
  • Received : 2017.04.23
  • Accepted : 2017.04.30
  • Published : 2017.06.30

Abstract

In this paper, we propose a power control technique for D2D communication in the heterogenous network consisting of cellular and D2D communication systems. Although the transmit signal of D2D communication degrades the performance of cellular system by interfering the signal reception at CU in the conventional heterogenous networks without eavesdroppers, it can be utilized as jamming signal for preventing other devices from recovering the transmitted information if there are eavesdroppers in the network. The proposed power control technique maximizes the achievable rate of D2D communication while ensuring the target security performance of cellular communication system. Through simulation results, we validate the analysis results and compare the performance with the conventional D2D communication scheme that utilizes its full transmit power for maximizing the achievable rate regardless of the performance of cellular system.

본 논문에서는 셀룰러 통신과 D2D (device-to-device)통신이 같은 주파수를 통해 이루어지는 이기종 네트워크(heterogenous network)에서 셀룰러 망의 보안통신을 돕기 위한 D2D 통신 디바이스의 전력제어 기법을 제안하고 성능을 살펴본다. 기존의 보안통신이 고려되지 않은 이기종 네트워크에서는 D2D통신 신호가 간섭으로 작용하여 셀룰러 통신 성능에 악영향을 미쳤으나 도청자를 고려한 보안통신에서는 D2D통신 신호가 도청자의 신호수신을 방해하여 보안 전송률 성능 향상에 도움이 될 수 있다. 본 연구에서는 셀룰러 망의 보안통신 요구치를 만족시키며 D2D 통신 전송률을 극대화 시킬 수 있는 새로운 전력제어 기법을 제안하고 최적화 문제를 통해 최적 송신 전력의 closed-form 표현을 도출하였다. 또한 시뮬레이션을 통해 제안기법의 성능 특성을 확인하였다.

Keywords

References

  1. X. Teng, J. B. Wendt, and M. Potkonjak, "Security of IoT systems: Design challenges and opportunities," in Proc. IEEE/ACM International Conference on Computer-Aided Design, Nov. 2014, pp. 417-423.
  2. M. Centenaro, L. Vangelista, A. Zanella, and M. Zorzi, "Long-range communications in unlicensed bands: the rising stars in the IoT and smart city scenarios," IEEE Wireless Communications, vol. 23, no. 5, pp. 60-67, Oct. 2016. https://doi.org/10.1109/MWC.2016.7721743
  3. S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wiretap channel," IEEE Transactiona on Information Theory, vol. 24, pp. 451-456, July 1978. https://doi.org/10.1109/TIT.1978.1055917
  4. G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Transactions on Signal Processing, vol. 59, no. 3, pp. 1317-1322, Mar. 2011. https://doi.org/10.1109/TSP.2010.2092774
  5. K.-H. Park, T. Wang, and M.-S. Alouini, "On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming," IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1741-1750, Sep. 2013. https://doi.org/10.1109/JSAC.2013.130908
  6. H. Hui, A. L. Swindlehurst, G. Li, and J. Liang, "Secure relay and jammer selection for physical layer security," IEEE Signal Processing Letters, vol. 22, no. 8, pp. 1147-1151, Aug. 2015. https://doi.org/10.1109/LSP.2014.2387860
  7. Y. Wang, Z. Chen, Y. Yao, M. Shen, and B. Xia, "Secure communications of cellular users in Device-to-device communication underlaying cellular networks," in 2014 Sixth International Conference on Wireless Communications and Signal Processing. (WCSP), 2014.