Skip to main content

Advertisement

Log in

Security enhancement in cellular networks employing D2D friendly jammer for V2V communication

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

In this paper, the security aspects in the vehicle-to-vehicle (V2V) communication with the backbone cellular network is thoroughly investigated with the aid of a device-to-device (D2D) communication link that shares the spectral resources using the base station with multiple-antennas. With assumptions of authorized user’s channel state information and by utilizing the maximal ratio transmission at the base station, derivation of ergodic secrecy capacity and ergodic capacity for the wiretap channel and D2D link respectively are derived. Existing works lacks to elaborate the impact of security and power optimization through D2D communications, particularly for V2V applications. This article also exhibits an easy and efficient method of power allocation to enhance the secrecy performance that satisfies the requirements of D2D transmission. Also, the Golden algorithm is derived to optimize the power allocation mechanism. Eventually, numerical results are presented to illustrate the advantages of our investigation by concluding that D2D communication’s interference is taken as a friendly jammer to improve transmission security in mobile networks. The results emphasize the support of D2D interference for providing enhanced secrecy capacity for the wireless and wiretap channel with optimized power allocation targeted towards better V2V communication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Data availability

Data sharing is not applicable to this article as no new data were created or analyzed in this study.

References

  1. Wang, M., Zheng, Yan: A survey on security in D2D communications. Mobile Networks and Applications Vol 22(2), 195–208 (2017)

    Article  Google Scholar 

  2. Yang, H., Xie, X., Kadoch, M.: Intelligent resource management based on reinforcement learning for ultra-reliable and low-latency IoV communication networks. IEEE Trans. Veh. Technol. 68(5), 4157–4169 (2019)

    Article  Google Scholar 

  3. Li, J., Petropulu, A.P.: On ergodic secrecy rate for Gaussian MISO wiretap channels. IEEE Trans. Wireless Commun. 10, 1176–1187 (2011)

    Article  Google Scholar 

  4. Gerbracht, S., Scheunert, C., Jorswieck, E.A.: Secrecy outage in MISO systems with partial channel information. IEEE Trans. Inf. Forensics Secur. 7, 704–716 (2012)

    Article  Google Scholar 

  5. Ma, W., Liao, W.C., Chi, C.: QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial noise aided approach. IEEE Trans. Signal Process. 59, 1202–1216 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  6. Lai, S.H., Lin, P.H., Lin, S.: On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels. Journal on Selected Areas in Communications 31, 1728–1740 (2013)

    Article  Google Scholar 

  7. Yang, D., Alam, M., Rodriguez, J.: Secure device-to-device communication in LTE. IEEE Commun. Mag. 52, 66–73 (2014)

    Article  Google Scholar 

  8. Zhu, D., Swindlehurst, A.L., Fakoorian, S.A.A.: Device-to-device communications: The physical layer security advantage 1, 1606–1610 (2014)

    Google Scholar 

  9. Yu, H., Yue, J., Zhou, W.: Secrecy-based access control for de-vice-to-device communication underlaying cellular networks. IEEE Commun. Lett. 17, 2068–2071 (2013)

    Article  Google Scholar 

  10. Irrum, F., Ali, M., Naeem, M., Anpalagan, A., Qaisar, S., Qamar, F.: D2D-enabled resource management in secrecy-ensured 5G and beyond Heterogeneous networks. Physical Communication 45, 101275 (2021)

    Article  Google Scholar 

  11. Fakoorian, A.L., Swindlehurst: Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer. IEEE Trans. Signal Process. 59, 5013–5022 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  12. Ma, D., Pei, M., Wei, J.: Adaptive limited feedback for MISO wiretap channels with cooperative jamming. IEEE Trans. Signal Process. 62, 993–1004 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  13. Tehrani, M.N.: et.al, Device-to-device communication in 5G cellular networks: Challenges, solutions, and future directions, IEEE Communications Magazine 52, pp.86–92

  14. Ouyang, J., Lin, M., Zhu, W.: Joint beamforming and power control for device-to-device communications underlying cellular networks. IEEE J. Sel. Areas Commun. 34, 138–150 (2016)

    Article  Google Scholar 

  15. Ma, D., Tsudik, G.: Security, and Privacy in emerging wireless networks. IEEE Wirel. Commun. 17, 12–21 (2010)

    Article  Google Scholar 

  16. Huang, J., Mukherjee, A., Swindlehurst, A.L.: Principles of physical layer security in multi-user wireless networks: A survey. IEEE Communications Surveys & Tutorials 16(3), 1550–1573 (2014)

    Article  Google Scholar 

  17. Wang, X., Zou, Y., M, L.V.C.: Improving physical layer security in wireless communications using diversity techniques. IEEE Network 29, 42–48 (2015)

    Article  Google Scholar 

  18. Ghavimi, F., Chen, H.H.: M2M communications in 3GPPLTE/LTE-A networks: Architectures, service requirements, challenges, and applications. IEEE Communications Surveys & Tutorials 17, 525–549 (2015)

    Article  Google Scholar 

  19. Ghosh, X., Lin, R., Ratasuk, An overview of 3GPP device-to-device proximity services, IEEE Communications Magazine 52 pp.40–48

  20. Andreev, S., Pyattaev, A., Y, K., “Proximity-based data offloading via network-assisted device-to-device communications”, pp.1–5, 2013

  21. Wang, H., Zhao, B., Zheng, T.: “Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks”. IEEE Trans. Commun. 67(2), 1254–1267 (Feb. 2019). doi:https://doi.org/10.1109/TCOMM.2018.2880216

    Article  Google Scholar 

  22. Manolakis, K., Xu, W., Caire, G., “Synchronization signal design and hierarchical detection for the D2D sidelink,“ 2017 51st Asilomar Conference on Signals, Systems, and Computers, Grove, P., CA, 2017, pp. 1650-1654. doi: https://doi.org/10.1109/ACSSC.2017.8335639

  23. Kar, U.N., Sanyal, D.K.: An overview of device-to-device communication in cellular networks. ICT Express 4(4), 203–208 (2018). https://doi.org/10.1016/j.icte.2017.08.002

    Article  Google Scholar 

  24. Lee, N., Lin, X., Andrews, J.G., and Robert W. Heath Jr (2013) Power Control for D2D Underlaid Cellular Networks: Modeling, Algorithms and Analysis

  25. Amin Ghazanfari, E., Björnson, Larsson, E.G., Power Control for D2D Underlay in Multi-cell Massive MIMO Networks, Nov. 2018

  26. Dai, M., Mao, B., Shen, D., Lin, X., Wang, H., Chen, B., “Incorporating D2D to Current Cellular Communication System,” Mobile Information Systems, vol. 2016, Article ID 2732917, 7 pages, 2016

  27. Khuntia, P.: and Ranjay Hazra. “An Efficient Channel and Power Allocation Scheme for D2D Enabled Cellular Communication System: An IoT Application.“ IEEE Sensors Journal, 2021

  28. Peng, J., Qiu, H., Cai, J., Xu, W., Wang, J.: “D2D-Assisted Multi-User Cooperative Partial Offloading, Transmission Scheduling and Computation Allocating for MEC.“ IEEE Transactions on Wireless Communications, 2021

  29. Sun, W., Ström, E.G., Brännström, F., Sou, K.C., Sui, Y.: Radio resource management for D2D-based V2V communication. IEEE Trans. Veh. Technol. 65(8), 6636–6650 (2015)

    Article  Google Scholar 

  30. Zhang, S., Hou, Y., Xu, X., Tao, X., “Resource allocation in D2D-based V2V communication for maximizing the number of concurrent transmissions,“: 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Valencia, 2016, pp. 1-6, doi: https://doi.org/10.1109/PIMRC.2016.7794859

  31. Lee, C., “A collaborative power control and resources allocation for D2D (device-to-device) communication underlaying LTE cellular networks,“ in Cluster Computing, vol. 20, no. 1, pp. 559-67, 2017

  32. Ye, H., Li, G.Y., Juang, B.F.: “Deep Reinforcement Learning Based Resource Allocation for V2V Communications”. IEEE Trans. Veh. Technol. 68(4), 3163–3173 (2019)

    Article  Google Scholar 

  33. Abd-Elrahman, E., Said, A.M., Toukabri, T., Afifi, H., Marot, M., “A hybrid model to extend vehicular intercommunication V2V through D2D architecture,“ 2015 International Conference on Computing, Networking and Communications (ICNC), Garden Grove, CA, 2015, pp. 754-759

  34. Liang, L., Li, G.Y., Xu, W.: “Resource Allocation for D2D-Enabled Vehicular Communications”. IEEE Trans. Commun. 65(7), 3186–3197 (July 2017)

    Article  Google Scholar 

  35. Zhang, X., Shang, Y., Li, X., Fang, J., “Research on Overlay D2D Resource Scheduling Algorithms for V2V Broadcast Service,“ 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall), Montreal, QC, 2016, pp. 1-5

  36. Ren, Y., Liu, F., Liu, Z., Wang, C., Ji, Y.,  (2015) Power Control in D2D-Based Vehicular Communication Networks,“ in IEEE Transactions on Vehicular Technology, 64(12): 5547-5562

Download references

Acknowledgements

The authors gratefully acknowledge the Management, and Faculty of Mepco Schlenk Engineering College, Sivakasi, India, and School of Electronics and Electrical Engineering, Lovely Professional University, Punjab, India for their support and extending necessary facilities to carry out this work.

Funding

No funding available for this paper.

Author information

Authors and Affiliations

Authors

Contributions

SKJ Conceptualization of the idea, Flow of the paper, writing - original draft, writing and editing of the manuscript.

Corresponding author

Correspondence to Sudeep Tanwar.

Ethics declarations

Conflict of interest

All authors declare that they have no conflict of interest.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, J.S., Gupta, A., Tanwar, S. et al. Security enhancement in cellular networks employing D2D friendly jammer for V2V communication. Cluster Comput 26, 865–878 (2023). https://doi.org/10.1007/s10586-022-03551-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-022-03551-0

Keywords

Navigation