File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Secure D2D communication in large-scale cognitive cellular networks: A wireless power transfer model

TitleSecure D2D communication in large-scale cognitive cellular networks: A wireless power transfer model
Authors
KeywordsCognitive cellular networks
D2D communication
Physical layer security
Stochastic geometry
Wireless power transfer
Issue Date2016
Citation
IEEE Transactions on Communications, 2016, v. 64, n. 1, p. 329-342 How to Cite?
AbstractIn this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multiantenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the primary base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, three wireless power transfer (WPT) policies are proposed: 1) co-operative power beacons (CPB) power transfer, 2) best power beacon (BPB) power transfer, and 3) nearest power beacon (NPB) power transfer. To characterize the power transfer reliability of the proposed three policies, we derive new expressions for the exact power outage probability. Moreover, the analysis of the power outage probability is extended to the case when PBs are equipped with large antenna arrays. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), where the receiver with the strongest channel is selected; and 2) nearest receiver selection (NRS), where the nearest receiver is selected. To assess the secrecy performance, we derive new analytical expressions for the secrecy outage probability and the secrecy throughput considering the two receiver selection schemes using the proposed WPT policies. We presented Monte carlo simulation results to corroborate our analysis and show: 1) secrecy performance improves with increasing densities of PBs and D2D receivers due to larger multiuser diversity gain; 2) CPB achieves better secrecy performance than BPB and NPB but consumes more power; and 3) BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead. A pivotal conclusion is reached that with increasing number of antennas at PBs, NPB offers a comparable secrecy performance to that of BPB but with a lower complexity.
Persistent Identifierhttp://hdl.handle.net/10722/349110
ISSN
2023 Impact Factor: 7.2
2020 SCImago Journal Rankings: 1.468

 

DC FieldValueLanguage
dc.contributor.authorLiu, Yuanwei-
dc.contributor.authorWang, Lifeng-
dc.contributor.authorZaidi, Syed Ali Raza-
dc.contributor.authorElkashlan, Maged-
dc.contributor.authorDuong, Trung Q.-
dc.date.accessioned2024-10-17T06:56:20Z-
dc.date.available2024-10-17T06:56:20Z-
dc.date.issued2016-
dc.identifier.citationIEEE Transactions on Communications, 2016, v. 64, n. 1, p. 329-342-
dc.identifier.issn0090-6778-
dc.identifier.urihttp://hdl.handle.net/10722/349110-
dc.description.abstractIn this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multiantenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the primary base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, three wireless power transfer (WPT) policies are proposed: 1) co-operative power beacons (CPB) power transfer, 2) best power beacon (BPB) power transfer, and 3) nearest power beacon (NPB) power transfer. To characterize the power transfer reliability of the proposed three policies, we derive new expressions for the exact power outage probability. Moreover, the analysis of the power outage probability is extended to the case when PBs are equipped with large antenna arrays. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), where the receiver with the strongest channel is selected; and 2) nearest receiver selection (NRS), where the nearest receiver is selected. To assess the secrecy performance, we derive new analytical expressions for the secrecy outage probability and the secrecy throughput considering the two receiver selection schemes using the proposed WPT policies. We presented Monte carlo simulation results to corroborate our analysis and show: 1) secrecy performance improves with increasing densities of PBs and D2D receivers due to larger multiuser diversity gain; 2) CPB achieves better secrecy performance than BPB and NPB but consumes more power; and 3) BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead. A pivotal conclusion is reached that with increasing number of antennas at PBs, NPB offers a comparable secrecy performance to that of BPB but with a lower complexity.-
dc.languageeng-
dc.relation.ispartofIEEE Transactions on Communications-
dc.subjectCognitive cellular networks-
dc.subjectD2D communication-
dc.subjectPhysical layer security-
dc.subjectStochastic geometry-
dc.subjectWireless power transfer-
dc.titleSecure D2D communication in large-scale cognitive cellular networks: A wireless power transfer model-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/TCOMM.2015.2498171-
dc.identifier.scopuseid_2-s2.0-84958181703-
dc.identifier.volume64-
dc.identifier.issue1-
dc.identifier.spage329-
dc.identifier.epage342-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats