Optimal D2D power for secure D2D communication with random eavesdropper in 5G-IoT networks

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE(2024)

引用 0|浏览0
暂无评分
摘要
In the rapidly evolving landscape of fifth generation Internet of Things (5G-IoT) networks, Device-to-Device (D2D) communication has emerged as a promising paradigm to enhance secrecy transmission rate (STR) and connectivity. However, the security of D2D communications in the presence of eavesdroppers remains a critical challenge. This article investigates the problem of optimizing D2D transmit power to achieve secure D2D communication while considering the presence of random eavesdroppers in 5G-IoT networks. We propose a novel secrecy-based power control approach (SRMWPCA) approach to model the random distribution of eavesdroppers in the network, taking into account their varying distances from D2D pairs and deliberately increasing interference at the eavesdropper's link. By leveraging tools from stochastic geometry, we derive an analytical expression for the secrecy transmission probability (STP), which quantifies the probability of eavesdroppers successfully decoding the D2D transmission. In this analysis, we have incorporated practical considerations such as channel fading, path loss, and interference from other devices. To enhance the security of D2D communication, we formulate an optimization problem to determine the optimal transmit power levels for D2D pairs, subject to constraints on the secrecy transmission probability and interference to the cellular network. We propose an efficient algorithm to find the power allocation that maximizes the secrecy outage performance while meeting these constraints. Simulation results demonstrate the effectiveness of the proposed approach in achieving secure D2D communication in 5G-IoT networks with random eavesdroppers. The performance of the proposed SRMWPCA approach improved by 23.25% and 20.9% compared with standard approaches in terms of the secrecy rate and throughput of the users from malicious attacks.
更多
查看译文
关键词
5G,Device-to-Device (D2D) communication,Internet of Things,physical layer security,Poisson point process,secrecy transmission probability
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要