Abstract
In this paper, the security aspects in the vehicle-to-vehicle (V2V) communication with the backbone cellular network is thoroughly investigated with the aid of a device-to-device (D2D) communication link that shares the spectral resources using the base station with multiple-antennas. With assumptions of authorized user’s channel state information and by utilizing the maximal ratio transmission at the base station, derivation of ergodic secrecy capacity and ergodic capacity for the wiretap channel and D2D link respectively are derived. Existing works lacks to elaborate the impact of security and power optimization through D2D communications, particularly for V2V applications. This article also exhibits an easy and efficient method of power allocation to enhance the secrecy performance that satisfies the requirements of D2D transmission. Also, the Golden algorithm is derived to optimize the power allocation mechanism. Eventually, numerical results are presented to illustrate the advantages of our investigation by concluding that D2D communication’s interference is taken as a friendly jammer to improve transmission security in mobile networks. The results emphasize the support of D2D interference for providing enhanced secrecy capacity for the wireless and wiretap channel with optimized power allocation targeted towards better V2V communication.




Similar content being viewed by others
Data availability
Data sharing is not applicable to this article as no new data were created or analyzed in this study.
References
Wang, M., Zheng, Yan: A survey on security in D2D communications. Mobile Networks and Applications Vol 22(2), 195–208 (2017)
Yang, H., Xie, X., Kadoch, M.: Intelligent resource management based on reinforcement learning for ultra-reliable and low-latency IoV communication networks. IEEE Trans. Veh. Technol. 68(5), 4157–4169 (2019)
Li, J., Petropulu, A.P.: On ergodic secrecy rate for Gaussian MISO wiretap channels. IEEE Trans. Wireless Commun. 10, 1176–1187 (2011)
Gerbracht, S., Scheunert, C., Jorswieck, E.A.: Secrecy outage in MISO systems with partial channel information. IEEE Trans. Inf. Forensics Secur. 7, 704–716 (2012)
Ma, W., Liao, W.C., Chi, C.: QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial noise aided approach. IEEE Trans. Signal Process. 59, 1202–1216 (2011)
Lai, S.H., Lin, P.H., Lin, S.: On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels. Journal on Selected Areas in Communications 31, 1728–1740 (2013)
Yang, D., Alam, M., Rodriguez, J.: Secure device-to-device communication in LTE. IEEE Commun. Mag. 52, 66–73 (2014)
Zhu, D., Swindlehurst, A.L., Fakoorian, S.A.A.: Device-to-device communications: The physical layer security advantage 1, 1606–1610 (2014)
Yu, H., Yue, J., Zhou, W.: Secrecy-based access control for de-vice-to-device communication underlaying cellular networks. IEEE Commun. Lett. 17, 2068–2071 (2013)
Irrum, F., Ali, M., Naeem, M., Anpalagan, A., Qaisar, S., Qamar, F.: D2D-enabled resource management in secrecy-ensured 5G and beyond Heterogeneous networks. Physical Communication 45, 101275 (2021)
Fakoorian, A.L., Swindlehurst: Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer. IEEE Trans. Signal Process. 59, 5013–5022 (2011)
Ma, D., Pei, M., Wei, J.: Adaptive limited feedback for MISO wiretap channels with cooperative jamming. IEEE Trans. Signal Process. 62, 993–1004 (2014)
Tehrani, M.N.: et.al, Device-to-device communication in 5G cellular networks: Challenges, solutions, and future directions, IEEE Communications Magazine 52, pp.86–92
Ouyang, J., Lin, M., Zhu, W.: Joint beamforming and power control for device-to-device communications underlying cellular networks. IEEE J. Sel. Areas Commun. 34, 138–150 (2016)
Ma, D., Tsudik, G.: Security, and Privacy in emerging wireless networks. IEEE Wirel. Commun. 17, 12–21 (2010)
Huang, J., Mukherjee, A., Swindlehurst, A.L.: Principles of physical layer security in multi-user wireless networks: A survey. IEEE Communications Surveys & Tutorials 16(3), 1550–1573 (2014)
Wang, X., Zou, Y., M, L.V.C.: Improving physical layer security in wireless communications using diversity techniques. IEEE Network 29, 42–48 (2015)
Ghavimi, F., Chen, H.H.: M2M communications in 3GPPLTE/LTE-A networks: Architectures, service requirements, challenges, and applications. IEEE Communications Surveys & Tutorials 17, 525–549 (2015)
Ghosh, X., Lin, R., Ratasuk, An overview of 3GPP device-to-device proximity services, IEEE Communications Magazine 52 pp.40–48
Andreev, S., Pyattaev, A., Y, K., “Proximity-based data offloading via network-assisted device-to-device communications”, pp.1–5, 2013
Wang, H., Zhao, B., Zheng, T.: “Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks”. IEEE Trans. Commun. 67(2), 1254–1267 (Feb. 2019). doi:https://doi.org/10.1109/TCOMM.2018.2880216
Manolakis, K., Xu, W., Caire, G., “Synchronization signal design and hierarchical detection for the D2D sidelink,“ 2017 51st Asilomar Conference on Signals, Systems, and Computers, Grove, P., CA, 2017, pp. 1650-1654. doi: https://doi.org/10.1109/ACSSC.2017.8335639
Kar, U.N., Sanyal, D.K.: An overview of device-to-device communication in cellular networks. ICT Express 4(4), 203–208 (2018). https://doi.org/10.1016/j.icte.2017.08.002
Lee, N., Lin, X., Andrews, J.G., and Robert W. Heath Jr (2013) Power Control for D2D Underlaid Cellular Networks: Modeling, Algorithms and Analysis
Amin Ghazanfari, E., Björnson, Larsson, E.G., Power Control for D2D Underlay in Multi-cell Massive MIMO Networks, Nov. 2018
Dai, M., Mao, B., Shen, D., Lin, X., Wang, H., Chen, B., “Incorporating D2D to Current Cellular Communication System,” Mobile Information Systems, vol. 2016, Article ID 2732917, 7 pages, 2016
Khuntia, P.: and Ranjay Hazra. “An Efficient Channel and Power Allocation Scheme for D2D Enabled Cellular Communication System: An IoT Application.“ IEEE Sensors Journal, 2021
Peng, J., Qiu, H., Cai, J., Xu, W., Wang, J.: “D2D-Assisted Multi-User Cooperative Partial Offloading, Transmission Scheduling and Computation Allocating for MEC.“ IEEE Transactions on Wireless Communications, 2021
Sun, W., Ström, E.G., Brännström, F., Sou, K.C., Sui, Y.: Radio resource management for D2D-based V2V communication. IEEE Trans. Veh. Technol. 65(8), 6636–6650 (2015)
Zhang, S., Hou, Y., Xu, X., Tao, X., “Resource allocation in D2D-based V2V communication for maximizing the number of concurrent transmissions,“: 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Valencia, 2016, pp. 1-6, doi: https://doi.org/10.1109/PIMRC.2016.7794859
Lee, C., “A collaborative power control and resources allocation for D2D (device-to-device) communication underlaying LTE cellular networks,“ in Cluster Computing, vol. 20, no. 1, pp. 559-67, 2017
Ye, H., Li, G.Y., Juang, B.F.: “Deep Reinforcement Learning Based Resource Allocation for V2V Communications”. IEEE Trans. Veh. Technol. 68(4), 3163–3173 (2019)
Abd-Elrahman, E., Said, A.M., Toukabri, T., Afifi, H., Marot, M., “A hybrid model to extend vehicular intercommunication V2V through D2D architecture,“ 2015 International Conference on Computing, Networking and Communications (ICNC), Garden Grove, CA, 2015, pp. 754-759
Liang, L., Li, G.Y., Xu, W.: “Resource Allocation for D2D-Enabled Vehicular Communications”. IEEE Trans. Commun. 65(7), 3186–3197 (July 2017)
Zhang, X., Shang, Y., Li, X., Fang, J., “Research on Overlay D2D Resource Scheduling Algorithms for V2V Broadcast Service,“ 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall), Montreal, QC, 2016, pp. 1-5
Ren, Y., Liu, F., Liu, Z., Wang, C., Ji, Y., (2015) Power Control in D2D-Based Vehicular Communication Networks,“ in IEEE Transactions on Vehicular Technology, 64(12): 5547-5562
Acknowledgements
The authors gratefully acknowledge the Management, and Faculty of Mepco Schlenk Engineering College, Sivakasi, India, and School of Electronics and Electrical Engineering, Lovely Professional University, Punjab, India for their support and extending necessary facilities to carry out this work.
Funding
No funding available for this paper.
Author information
Authors and Affiliations
Contributions
SKJ Conceptualization of the idea, Flow of the paper, writing - original draft, writing and editing of the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
All authors declare that they have no conflict of interest.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kumar, J.S., Gupta, A., Tanwar, S. et al. Security enhancement in cellular networks employing D2D friendly jammer for V2V communication. Cluster Comput 26, 865–878 (2023). https://doi.org/10.1007/s10586-022-03551-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-022-03551-0