Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks
Device-to-device (D2D) communication raises new transmission secrecy protection challenges, since conventional physical layer security approaches, such as multiple antennas and cooperation techniques, are invalid due to its resource/size constraints. The full-duplex (FD) jamming receiver, which radi...
Saved in:
Published in | IEEE transactions on communications Vol. 67; no. 2; pp. 1254 - 1267 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.02.2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 0090-6778 1558-0857 |
DOI | 10.1109/TCOMM.2018.2880216 |
Cover
Loading…
Abstract | Device-to-device (D2D) communication raises new transmission secrecy protection challenges, since conventional physical layer security approaches, such as multiple antennas and cooperation techniques, are invalid due to its resource/size constraints. The full-duplex (FD) jamming receiver, which radiates jamming signals to confuse eavesdroppers when receiving the desired signal simultaneously, is a promising candidate. Unlike existing endeavors that assume the FD jamming receiver always improves the secrecy performance compared with the half-duplex (HD) receiver, we show that this assumption highly depends on the instantaneous residual self-interference cancellation level and may be invalid. We propose an adaptive jamming receiver operating in a switched FD/HD mode for a D2D link in random networks. Subject to the secrecy outage probability constraint, we optimize the transceiver parameters, such as signal/jamming powers, secrecy rates, and mode switch criteria, to maximize the secrecy throughput. Most of the optimization operations are taken off-line and only very limited on-line calculations are required to make the scheme with low complexity. Furthermore, some interesting insights are provided, such as the secrecy throughput is a quasi-concave function. Numerical results are demonstrated to verify our theoretical findings, and to show its superiority compared with the receiver operating in the FD or HD mode only. |
---|---|
AbstractList | Device-to-device (D2D) communication raises new transmission secrecy protection challenges, since conventional physical layer security approaches, such as multiple antennas and cooperation techniques, are invalid due to its resource/size constraints. The full-duplex (FD) jamming receiver, which radiates jamming signals to confuse eavesdroppers when receiving the desired signal simultaneously, is a promising candidate. Unlike existing endeavors that assume the FD jamming receiver always improves the secrecy performance compared with the half-duplex (HD) receiver, we show that this assumption highly depends on the instantaneous residual self-interference cancellation level and may be invalid. We propose an adaptive jamming receiver operating in a switched FD/HD mode for a D2D link in random networks. Subject to the secrecy outage probability constraint, we optimize the transceiver parameters, such as signal/jamming powers, secrecy rates, and mode switch criteria, to maximize the secrecy throughput. Most of the optimization operations are taken off-line and only very limited on-line calculations are required to make the scheme with low complexity. Furthermore, some interesting insights are provided, such as the secrecy throughput is a quasi-concave function. Numerical results are demonstrated to verify our theoretical findings, and to show its superiority compared with the receiver operating in the FD or HD mode only. |
Author | Zheng, Tong-Xing Wang, Hui-Ming Zhao, Bing-Qing |
Author_xml | – sequence: 1 givenname: Hui-Ming orcidid: 0000-0003-4107-9512 surname: Wang fullname: Wang, Hui-Ming email: xjbswhm@gmail.com organization: Department of Information and Communications Engineering, Xi'an Jiaotong University, Xi'an, China – sequence: 2 givenname: Bing-Qing orcidid: 0000-0002-8207-5596 surname: Zhao fullname: Zhao, Bing-Qing email: zhaobq@stu.xjtu.edu.cn organization: Department of Information and Communications Engineering, Xi'an Jiaotong University, Xi'an, China – sequence: 3 givenname: Tong-Xing orcidid: 0000-0002-8730-5063 surname: Zheng fullname: Zheng, Tong-Xing email: zhengtx@mail.xjtu.edu.cn organization: Department of Information and Communications Engineering, Xi'an Jiaotong University, Xi'an, China |
BookMark | eNp9kDtPwzAUhS1UJNrCH4DFEnPKtR0n9li1lIdaKpUyR67jILdJHJyEx78npRUDA9MZ7vnukb4B6pWuNAhdEhgRAvJmPVkuFiMKRIyoEEBJdIL6hHMRgOBxD_UBJARRHIszNKjrLQCEwFgfLcapqhr7bvCszfNg2la5-cSPqihs-YpXRpvu5nHmPH42uvUGT-kUz225q7Et8UqVqSvwk2k-nN_V5-g0U3ltLo45RC-z2_XkPpgv7x4m43mgqeRNECpFlJCSSRAipiyiTDK9MUDTMKMbzWJqdBgJqiQBiMOY6BS4lJBSTniYsSG6PvytvHtrTd0kW9f6sptMKBEAURRy0bXEoaW9q2tvskTbRjXWlY1XNk8IJHt5yY-8ZC8vOcrrUPoHrbwtlP_6H7o6QNYY8wsITgUnjH0DnCB6OA |
CODEN | IECMBT |
CitedBy_id | crossref_primary_10_1109_ACCESS_2020_2986785 crossref_primary_10_1109_LWC_2020_2986404 crossref_primary_10_1007_s10586_022_03551_0 crossref_primary_10_1109_TVT_2023_3320907 crossref_primary_10_1109_JSAC_2023_3287615 crossref_primary_10_1109_TVT_2021_3129787 crossref_primary_10_1109_TVT_2021_3106661 crossref_primary_10_1109_TWC_2022_3217765 crossref_primary_10_1109_ACCESS_2021_3095852 crossref_primary_10_1109_ACCESS_2020_2979848 crossref_primary_10_1002_ett_3623 crossref_primary_10_1007_s11235_020_00693_7 crossref_primary_10_1109_TWC_2022_3178758 crossref_primary_10_1109_ACCESS_2024_3386746 crossref_primary_10_1109_TGCN_2021_3133305 crossref_primary_10_1002_cpe_7993 crossref_primary_10_1109_JIOT_2022_3202114 crossref_primary_10_1016_j_dcan_2020_07_004 crossref_primary_10_1109_TGCN_2021_3093206 crossref_primary_10_3390_e25121594 crossref_primary_10_1109_TVT_2021_3057830 crossref_primary_10_1587_transcom_2022EBT0007 crossref_primary_10_1109_TVT_2019_2949304 crossref_primary_10_1016_j_csi_2021_103540 crossref_primary_10_1109_JIOT_2024_3386765 crossref_primary_10_1109_TIFS_2021_3067157 crossref_primary_10_1002_dac_5399 crossref_primary_10_1016_j_procs_2021_04_041 crossref_primary_10_1109_TCOMM_2020_3009651 |
Cites_doi | 10.1109/JSAC.2009.090902 10.1109/MCOM.2015.7105651 10.1007/s11432-011-4306-8 10.1145/2534169.2486033 10.1109/TIFS.2018.2834301 10.1109/TCOMM.2016.2641949 10.1109/TSP.2012.2191543 10.1016/j.sigpro.2014.09.025 10.1109/TWC.2015.2445776 10.1109/TWC.2012.102612.111278 10.1109/WCL.2013.030613.130023 10.1109/MCOM.2017.1600264 10.1109/TCOMM.2018.2821158 10.1109/TSP.2011.2164910 10.1109/TSP.2010.2092774 10.1109/TWC.2014.2354635 10.1109/TWC.2013.010214.130226 10.1109/TSP.2011.2172433 10.1109/WCSP.2015.7341300 10.1109/TIFS.2017.2656462 10.1109/TSP.2017.2701318 10.1109/TWC.2017.2755640 10.1109/TSP.2015.2465301 10.1109/JSAC.2014.2330193 10.1109/ACSSC.2010.5757643 10.1109/TWC.2017.2689005 10.1109/COMST.2014.2319555 10.1017/CBO9780511804441 10.1109/MCOM.2014.6807946 10.1109/JSYST.2014.2298837 10.1002/j.1538-7305.1975.tb02040.x 10.1109/MCOM.2015.7081071 10.1109/TIFS.2013.2287046 10.1109/TWC.2014.2332164 10.1109/TSP.2009.2038412 10.1109/TSP.2010.2078810 10.1109/TWC.2016.2633336 10.1109/TIT.1978.1055917 10.1109/TWC.2009.080511 10.1109/GLOCOM.2016.7842253 10.1109/COMST.2016.2624939 10.1109/MCOM.2015.7355565 10.1109/TSP.2010.2094610 10.1109/COMST.2017.2649687 10.1109/TCOMM.2016.2519402 10.1109/TWC.2016.2622689 10.1109/TSP.2013.2269049 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
DBID | 97E RIA RIE AAYXX CITATION 7SP 8FD L7M |
DOI | 10.1109/TCOMM.2018.2880216 |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Electronics & Communications Abstracts Technology Research Database Advanced Technologies Database with Aerospace |
DatabaseTitle | CrossRef Technology Research Database Advanced Technologies Database with Aerospace Electronics & Communications Abstracts |
DatabaseTitleList | Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1558-0857 |
EndPage | 1267 |
ExternalDocumentID | 10_1109_TCOMM_2018_2880216 8528513 |
Genre | orig-research |
GrantInformation_xml | – fundername: Outstanding Young Research Fund of Shaanxi Province grantid: 2018JC-003 – fundername: National Natural Science Foundation of China grantid: 61671364; 61701390 funderid: 10.13039/501100001809 – fundername: China Postdoctoral Science Foundation grantid: 2017M613140; 2018T111064 funderid: 10.13039/501100002858 |
GroupedDBID | -~X .DC 0R~ 29I 3EH 4.4 5GY 5VS 6IK 85S 97E AAJGR AARMG AASAJ AAWTH ABAZT ABFSI ABQJQ ABVLG ACGFO ACGFS ACIWK ACKIV ACNCT AENEX AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 E.L EBS EJD HZ~ H~9 IAAWW IBMZZ ICLAB IES IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P RIA RIE RNS TAE TN5 VH1 ZCA ZCG AAYOK AAYXX CITATION RIG 7SP 8FD L7M |
ID | FETCH-LOGICAL-c295t-4aa1a8993908872362393cbe02d4f2bc372ec4682a91007471cd05990d25154f3 |
IEDL.DBID | RIE |
ISSN | 0090-6778 |
IngestDate | Mon Jun 30 10:14:47 EDT 2025 Thu Apr 24 23:04:16 EDT 2025 Tue Jul 01 02:51:28 EDT 2025 Wed Aug 27 03:03:27 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 2 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c295t-4aa1a8993908872362393cbe02d4f2bc372ec4682a91007471cd05990d25154f3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-8730-5063 0000-0002-8207-5596 0000-0003-4107-9512 |
PQID | 2180066458 |
PQPubID | 85472 |
PageCount | 14 |
ParticipantIDs | proquest_journals_2180066458 ieee_primary_8528513 crossref_citationtrail_10_1109_TCOMM_2018_2880216 crossref_primary_10_1109_TCOMM_2018_2880216 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2019-02-01 |
PublicationDateYYYYMMDD | 2019-02-01 |
PublicationDate_xml | – month: 02 year: 2019 text: 2019-02-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on communications |
PublicationTitleAbbrev | TCOMM |
PublicationYear | 2019 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 ref15 akgun (ref33) 2015 ref14 ref11 ref10 ref17 ref16 ref19 ref18 ref50 ref46 ref45 ref48 ref47 ref42 ref41 ref44 ref43 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 (ref37) 2014 ref35 ref34 ref36 ref31 ref30 ref32 ref2 ref1 ref39 ref38 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 stoyan (ref51) 1996 ref29 gradshteyn (ref49) 2007 |
References_xml | – year: 1996 ident: ref51 publication-title: Stochastic Geometry and its Applications – ident: ref38 doi: 10.1109/JSAC.2009.090902 – ident: ref23 doi: 10.1109/MCOM.2015.7105651 – ident: ref15 doi: 10.1007/s11432-011-4306-8 – ident: ref21 doi: 10.1145/2534169.2486033 – ident: ref35 doi: 10.1109/TIFS.2018.2834301 – ident: ref30 doi: 10.1109/TCOMM.2016.2641949 – ident: ref10 doi: 10.1109/TSP.2012.2191543 – ident: ref46 doi: 10.1016/j.sigpro.2014.09.025 – ident: ref47 doi: 10.1109/TWC.2015.2445776 – ident: ref26 doi: 10.1109/TWC.2012.102612.111278 – ident: ref43 doi: 10.1109/WCL.2013.030613.130023 – ident: ref36 doi: 10.1109/MCOM.2017.1600264 – ident: ref17 doi: 10.1109/TCOMM.2018.2821158 – ident: ref24 doi: 10.1109/TSP.2011.2164910 – ident: ref12 doi: 10.1109/TSP.2010.2092774 – ident: ref14 doi: 10.1109/TWC.2014.2354635 – ident: ref45 doi: 10.1109/TWC.2013.010214.130226 – ident: ref9 doi: 10.1109/TSP.2011.2172433 – ident: ref27 doi: 10.1109/WCSP.2015.7341300 – ident: ref28 doi: 10.1109/TIFS.2017.2656462 – ident: ref31 doi: 10.1109/TSP.2017.2701318 – start-page: 1 year: 2015 ident: ref33 article-title: Receiver-based friendly jamming with single-antenna full-duplex receivers in a multiuser broadcast channel publication-title: Proc IEEE Globecom – ident: ref34 doi: 10.1109/TWC.2017.2755640 – ident: ref8 doi: 10.1109/TSP.2015.2465301 – ident: ref22 doi: 10.1109/JSAC.2014.2330193 – ident: ref25 doi: 10.1109/ACSSC.2010.5757643 – ident: ref42 doi: 10.1109/TWC.2017.2689005 – ident: ref18 doi: 10.1109/COMST.2014.2319555 – ident: ref50 doi: 10.1017/CBO9780511804441 – ident: ref48 doi: 10.1109/MCOM.2014.6807946 – ident: ref19 doi: 10.1109/JSYST.2014.2298837 – ident: ref1 doi: 10.1002/j.1538-7305.1975.tb02040.x – ident: ref3 doi: 10.1109/MCOM.2015.7081071 – ident: ref13 doi: 10.1109/TIFS.2013.2287046 – ident: ref6 doi: 10.1109/TWC.2014.2332164 – ident: ref11 doi: 10.1109/TSP.2009.2038412 – ident: ref5 doi: 10.1109/TSP.2010.2078810 – ident: ref29 doi: 10.1109/TWC.2016.2633336 – ident: ref2 doi: 10.1109/TIT.1978.1055917 – ident: ref16 doi: 10.1109/TWC.2009.080511 – ident: ref44 doi: 10.1109/GLOCOM.2016.7842253 – year: 2007 ident: ref49 publication-title: Table of Integrals Series and Products – year: 2014 ident: ref37 publication-title: Study on LTE Device to Device Proximity Services – ident: ref40 doi: 10.1109/COMST.2016.2624939 – ident: ref4 doi: 10.1109/MCOM.2015.7355565 – ident: ref7 doi: 10.1109/TSP.2010.2094610 – ident: ref20 doi: 10.1109/COMST.2017.2649687 – ident: ref39 doi: 10.1109/TCOMM.2016.2519402 – ident: ref41 doi: 10.1109/TWC.2016.2622689 – ident: ref32 doi: 10.1109/TSP.2013.2269049 |
SSID | ssj0004033 |
Score | 2.4304495 |
Snippet | Device-to-device (D2D) communication raises new transmission secrecy protection challenges, since conventional physical layer security approaches, such as... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1254 |
SubjectTerms | Complexity theory device-to-device (D2D) communication Device-to-device communication Eavesdropping full-duplex (FD) Jamming Physical layer security Receivers Secrecy aspects secrecy outage secrecy throughput stochastic geometry Switches Switching theory Throughput |
Title | Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks |
URI | https://ieeexplore.ieee.org/document/8528513 https://www.proquest.com/docview/2180066458 |
Volume | 67 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH64nfTgrylOp-TgTbu1adI2x-GUMaiCKOxW8msgbt1wK4h_vUnazqEi3gpNSshL876XfO97AJfGqVKhie_ZIlYeUYp5grDI00qQOCKBSFxuVXofDZ_JaEzHW3C9zoXRWjvyme7aR3eXr-aysEdlvYRiAxDCBjRM4Fbman3lQPphpThp6exxUifI-Kz3dPOQppbFlXSxWa7Y1jbfcEKuqsqPrdj5l7s9SOuRlbSS126xEl358U208b9D34fdCmiifrkyDmBL54ewsyE_2IK0r_jCbnfIBqLeoFhM9Tsa8dnMvEYGUGpL2kAG1iJ3LK_RAA-QjV6X6CVHjzxX8xm6L4nkyyN4vrt9uhl6VXkFT2JGVx7hPOAm3Aot1SnGxpOFLJRC-1iRCRYyjLGWJEowZ4HT2Q-ksmouvjKYiJJJeAzNfJ7rE0CJpDgOgigiE2p6xImMolgxrinXgfBlG4J6vjNZaY_bEhjTzMUgPsucjTJro6yyURuu1n0WpfLGn61bdtLXLav5bkOnNmtW_ZzLzKAai7QITU5_73UG2-bbrCRnd6C5eiv0ucEeK3HhFt0n2a_RIw |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwFD54eVAfvIvTqXnwTTubNGmbx-GUeekEmeBbyW0gum64DcRfb5J2U1TEt0ITGnLSnO8k3_kOwLF1qkwaGgauiFVAteaBpDwOjJY0iSmWqc-tyjpx-4FeP7LHOTid5cIYYzz5zDTco7_L1wM1cUdlZykjFiBE87Bo_T7DZbbWZxZkGFWak47QnqTTFJmQn3XP77LM8bjSBrELlrjq5l_ckK-r8mMz9h7mcg2y6dhKYslzYzKWDfX-Tbbxv4Nfh9UKaqJmuTY2YM4Um7DyRYBwC7KmFkO34SEXigatyfDFvKFr0e_b18hCSuNoG8gCW-QP5g1qkRZy8esIPRXoXhR60Eedkko-2oaHy4vueTuoCiwEinA2DqgQWNiAK3Jkp4RYXxbxSEkTEk17RKooIUbROCWCY6-0j5V2ei6htqiI0V60AwvFoDC7gFLFSIJxHNMesz2SVMVxorkwTBgsQ1UDPJ3vXFXq464Ixkvuo5CQ595GubNRXtmoBiezPsNSe-PP1ltu0mctq_muQX1q1rz6PUe5xTUOa1GW7v3e6wiW2t3sNr-96tzsw7L9Di-p2nVYGL9OzIFFImN56BfgB_GV1Gw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Adaptive+Full-Duplex+Jamming+Receiver+for+Secure+D2D+Links+in+Random+Networks&rft.jtitle=IEEE+transactions+on+communications&rft.au=Hui-Ming%2C+Wang&rft.au=Bing-Qing+Zhao&rft.au=Tong-Xing%2C+Zheng&rft.date=2019-02-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=0090-6778&rft.eissn=1558-0857&rft.volume=67&rft.issue=2&rft.spage=1254&rft_id=info:doi/10.1109%2FTCOMM.2018.2880216&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0090-6778&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0090-6778&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0090-6778&client=summon |