In order to solve the problem of intercellular eavesdropping in Device to Device (D2D) communication, an anti-eavesdropping secure transmission scheme based on artificial noise assisted Time-Reversal (TR) was proposed. Firstly, the interference between cells was eliminated under the cross-cell channel model. Secondly, the ability of eavesdropping users to steal information was deteriorated by sending artificial noise to the base station to assist TR technology. Finally, in order to meet the needs of cellular users for service quality and maximize the system traversal secrecy rate, the power control allocation scheme with convex optimization was adopted to maximize the transmitted power of D2D users. Through simulation experiment analysis, compared with the artificial noise scheme, this scheme improves the achievable secrecy rate of 0.8 b·s-1·Hz-1 under the same Signal-to-Noise Ratio (SNR). In addition, with the increase of the number of neighboring cells, this scheme has improvement on the reachable secrecy rate more and more obvious.
[1] 王俊义,巩志帅,符杰林,等.D2D通信技术综述[J].桂林电子科技大学学报,2014,34(2):114-119.(WANG J Y, GONG Z S, FU J L, et al. A survey on device-to-device communication[J]. Journal of Guilin University of Electronic Technology, 2014,34(2):114-119.)
[2] HAUS M, WAQAS M, DING A Y, et al. Security and privacy in Device-to-Device (D2D) communication:a review[J]. IEEE Communications Surveys and Tutorials, 2017, 19(2):1054-1079.
[3] WEN S, ZHU X, ZHANG X, et al. QoS-aware mode selection and resource allocation scheme for Device-to-Device (D2D) communication in cellular networks[C]//Proceedings of the 2013 IEEE International Conference on Communications Workshops. Piscataway, NJ:IEEE, 2013:101-105.
[4] 李同会,段红光,唐虹,等.D2D通信系统中中继辅助的资源分配算法研究[J]. 电子技术应用,2017,43(10):89-93.(LI T H, DUAN H G, TANG H, et al. A relay-assisted resource allocation algorithm for D2D communication system[J]. Application of Electronic Technique, 2017, 43(10):89-93.)
[5] 杨丰瑞,庄园,陈永丽,等.基于中继协助的多小区D2D通信干扰管理方法[J].南京邮电大学学报(自然科学版),2017,37(3):60-67.(YANG F R, ZHUANG Y, CHEN Y L, et al. Interference management of multi-cell D2D communication based on relay assistance[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2017, 37(3):60-67.)
[6] MALANDRINO F, CASETTI C, CHIASSERINI C F, et al. Uplink and downlink resource allocation in D2D-enabled heterogeneous networks[C]//Proceedings of the 2014 IEEE Wireless Communications and Networking Conference Workshops. Piscataway, NJ:IEEE, 2014:87-92.
[7] 薛建彬,梁艳慧.基于MIMO-D2D异构网络的干扰抑制算法[J].华中科技大学学报(自然科学版), 2017,45(12):66-72.(XUE J B, LIANG Y H. Interference suppression algorithm based on MIMO-D2D heterogeneous networks[J]. Journal of Huazhong University of Science and Technology (Natural Science Edition), 2017, 45(12):66-72.)
[8] HE W, ZHANG W, BAI W, et al. Improving physical layer security in underlay D2D communication via Stackelberg game based power control[C]//Proceedings of the 2016 International Conference on Computer, Information and Telecommunication Systems. Piscataway, NJ:IEEE, 2016:1-5.
[9] JAYASINGHE K, JAYASINGHE P, RAJATHEVA N, et al. Physical layer security for relay assisted MIMO D2D communication[C]//Proceedings of the 2015 IEEE International Conference on Communication Workshop. Piscataway, NJ:IEEE, 2015:651-656.
[10] WANG W, TEH K C, LI K H. Enhanced physical layer security in D2D spectrum sharing networks[J]. IEEE Wireless Communications Letters, 2017, 6(1):106-109.
[11] YUE J, MA C, YU H, et al. Secrecy-based access control for device-to-device communication underlaying cellular networks[J]. IEEE Communications Letters, 2013, 17(11):2068-2071.
[12] YAN S, SHANG Y, ZHANG X, et al. An artificial noise scheme for secure communication in heterogeneous D2D and cellular networks[C]//Proceedings of the 2017 IEEE Vehicular Technology Conference. Piscataway, NJ:IEEE, 2017:1-5.
[13] 顾军,仲元红,张振宇,等.用于多小区多用户MIMO系统的干扰抑制方法[J].华南理工大学学报(自然科学版),2013,41(6):42-46.(GU J, ZHONG Y H, ZHANG Z Y, et al. Interference suppression for multi-cell multi-user MIMO systems[J]. Journal of South China University of Technology (Natural Science Edition), 2013, 41(6).42-46.)
[14] GOEL S, NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications, 2008, 7(6):2180-2189.