Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks

Device-to-device (D2D) communication raises new transmission secrecy protection challenges, since conventional physical layer security approaches, such as multiple antennas and cooperation techniques, are invalid due to its resource/size constraints. The full-duplex (FD) jamming receiver, which radi...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on communications Vol. 67; no. 2; pp. 1254 - 1267
Main Authors Wang, Hui-Ming, Zhao, Bing-Qing, Zheng, Tong-Xing
Format Journal Article
LanguageEnglish
Published New York IEEE 01.02.2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN0090-6778
1558-0857
DOI10.1109/TCOMM.2018.2880216

Cover

Loading…
Abstract Device-to-device (D2D) communication raises new transmission secrecy protection challenges, since conventional physical layer security approaches, such as multiple antennas and cooperation techniques, are invalid due to its resource/size constraints. The full-duplex (FD) jamming receiver, which radiates jamming signals to confuse eavesdroppers when receiving the desired signal simultaneously, is a promising candidate. Unlike existing endeavors that assume the FD jamming receiver always improves the secrecy performance compared with the half-duplex (HD) receiver, we show that this assumption highly depends on the instantaneous residual self-interference cancellation level and may be invalid. We propose an adaptive jamming receiver operating in a switched FD/HD mode for a D2D link in random networks. Subject to the secrecy outage probability constraint, we optimize the transceiver parameters, such as signal/jamming powers, secrecy rates, and mode switch criteria, to maximize the secrecy throughput. Most of the optimization operations are taken off-line and only very limited on-line calculations are required to make the scheme with low complexity. Furthermore, some interesting insights are provided, such as the secrecy throughput is a quasi-concave function. Numerical results are demonstrated to verify our theoretical findings, and to show its superiority compared with the receiver operating in the FD or HD mode only.
AbstractList Device-to-device (D2D) communication raises new transmission secrecy protection challenges, since conventional physical layer security approaches, such as multiple antennas and cooperation techniques, are invalid due to its resource/size constraints. The full-duplex (FD) jamming receiver, which radiates jamming signals to confuse eavesdroppers when receiving the desired signal simultaneously, is a promising candidate. Unlike existing endeavors that assume the FD jamming receiver always improves the secrecy performance compared with the half-duplex (HD) receiver, we show that this assumption highly depends on the instantaneous residual self-interference cancellation level and may be invalid. We propose an adaptive jamming receiver operating in a switched FD/HD mode for a D2D link in random networks. Subject to the secrecy outage probability constraint, we optimize the transceiver parameters, such as signal/jamming powers, secrecy rates, and mode switch criteria, to maximize the secrecy throughput. Most of the optimization operations are taken off-line and only very limited on-line calculations are required to make the scheme with low complexity. Furthermore, some interesting insights are provided, such as the secrecy throughput is a quasi-concave function. Numerical results are demonstrated to verify our theoretical findings, and to show its superiority compared with the receiver operating in the FD or HD mode only.
Author Zheng, Tong-Xing
Wang, Hui-Ming
Zhao, Bing-Qing
Author_xml – sequence: 1
  givenname: Hui-Ming
  orcidid: 0000-0003-4107-9512
  surname: Wang
  fullname: Wang, Hui-Ming
  email: xjbswhm@gmail.com
  organization: Department of Information and Communications Engineering, Xi'an Jiaotong University, Xi'an, China
– sequence: 2
  givenname: Bing-Qing
  orcidid: 0000-0002-8207-5596
  surname: Zhao
  fullname: Zhao, Bing-Qing
  email: zhaobq@stu.xjtu.edu.cn
  organization: Department of Information and Communications Engineering, Xi'an Jiaotong University, Xi'an, China
– sequence: 3
  givenname: Tong-Xing
  orcidid: 0000-0002-8730-5063
  surname: Zheng
  fullname: Zheng, Tong-Xing
  email: zhengtx@mail.xjtu.edu.cn
  organization: Department of Information and Communications Engineering, Xi'an Jiaotong University, Xi'an, China
BookMark eNp9kDtPwzAUhS1UJNrCH4DFEnPKtR0n9li1lIdaKpUyR67jILdJHJyEx78npRUDA9MZ7vnukb4B6pWuNAhdEhgRAvJmPVkuFiMKRIyoEEBJdIL6hHMRgOBxD_UBJARRHIszNKjrLQCEwFgfLcapqhr7bvCszfNg2la5-cSPqihs-YpXRpvu5nHmPH42uvUGT-kUz225q7Et8UqVqSvwk2k-nN_V5-g0U3ltLo45RC-z2_XkPpgv7x4m43mgqeRNECpFlJCSSRAipiyiTDK9MUDTMKMbzWJqdBgJqiQBiMOY6BS4lJBSTniYsSG6PvytvHtrTd0kW9f6sptMKBEAURRy0bXEoaW9q2tvskTbRjXWlY1XNk8IJHt5yY-8ZC8vOcrrUPoHrbwtlP_6H7o6QNYY8wsITgUnjH0DnCB6OA
CODEN IECMBT
CitedBy_id crossref_primary_10_1109_ACCESS_2020_2986785
crossref_primary_10_1109_LWC_2020_2986404
crossref_primary_10_1007_s10586_022_03551_0
crossref_primary_10_1109_TVT_2023_3320907
crossref_primary_10_1109_JSAC_2023_3287615
crossref_primary_10_1109_TVT_2021_3129787
crossref_primary_10_1109_TVT_2021_3106661
crossref_primary_10_1109_TWC_2022_3217765
crossref_primary_10_1109_ACCESS_2021_3095852
crossref_primary_10_1109_ACCESS_2020_2979848
crossref_primary_10_1002_ett_3623
crossref_primary_10_1007_s11235_020_00693_7
crossref_primary_10_1109_TWC_2022_3178758
crossref_primary_10_1109_ACCESS_2024_3386746
crossref_primary_10_1109_TGCN_2021_3133305
crossref_primary_10_1002_cpe_7993
crossref_primary_10_1109_JIOT_2022_3202114
crossref_primary_10_1016_j_dcan_2020_07_004
crossref_primary_10_1109_TGCN_2021_3093206
crossref_primary_10_3390_e25121594
crossref_primary_10_1109_TVT_2021_3057830
crossref_primary_10_1587_transcom_2022EBT0007
crossref_primary_10_1109_TVT_2019_2949304
crossref_primary_10_1016_j_csi_2021_103540
crossref_primary_10_1109_JIOT_2024_3386765
crossref_primary_10_1109_TIFS_2021_3067157
crossref_primary_10_1002_dac_5399
crossref_primary_10_1016_j_procs_2021_04_041
crossref_primary_10_1109_TCOMM_2020_3009651
Cites_doi 10.1109/JSAC.2009.090902
10.1109/MCOM.2015.7105651
10.1007/s11432-011-4306-8
10.1145/2534169.2486033
10.1109/TIFS.2018.2834301
10.1109/TCOMM.2016.2641949
10.1109/TSP.2012.2191543
10.1016/j.sigpro.2014.09.025
10.1109/TWC.2015.2445776
10.1109/TWC.2012.102612.111278
10.1109/WCL.2013.030613.130023
10.1109/MCOM.2017.1600264
10.1109/TCOMM.2018.2821158
10.1109/TSP.2011.2164910
10.1109/TSP.2010.2092774
10.1109/TWC.2014.2354635
10.1109/TWC.2013.010214.130226
10.1109/TSP.2011.2172433
10.1109/WCSP.2015.7341300
10.1109/TIFS.2017.2656462
10.1109/TSP.2017.2701318
10.1109/TWC.2017.2755640
10.1109/TSP.2015.2465301
10.1109/JSAC.2014.2330193
10.1109/ACSSC.2010.5757643
10.1109/TWC.2017.2689005
10.1109/COMST.2014.2319555
10.1017/CBO9780511804441
10.1109/MCOM.2014.6807946
10.1109/JSYST.2014.2298837
10.1002/j.1538-7305.1975.tb02040.x
10.1109/MCOM.2015.7081071
10.1109/TIFS.2013.2287046
10.1109/TWC.2014.2332164
10.1109/TSP.2009.2038412
10.1109/TSP.2010.2078810
10.1109/TWC.2016.2633336
10.1109/TIT.1978.1055917
10.1109/TWC.2009.080511
10.1109/GLOCOM.2016.7842253
10.1109/COMST.2016.2624939
10.1109/MCOM.2015.7355565
10.1109/TSP.2010.2094610
10.1109/COMST.2017.2649687
10.1109/TCOMM.2016.2519402
10.1109/TWC.2016.2622689
10.1109/TSP.2013.2269049
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
DBID 97E
RIA
RIE
AAYXX
CITATION
7SP
8FD
L7M
DOI 10.1109/TCOMM.2018.2880216
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Electronics & Communications Abstracts
Technology Research Database
Advanced Technologies Database with Aerospace
DatabaseTitle CrossRef
Technology Research Database
Advanced Technologies Database with Aerospace
Electronics & Communications Abstracts
DatabaseTitleList Technology Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-0857
EndPage 1267
ExternalDocumentID 10_1109_TCOMM_2018_2880216
8528513
Genre orig-research
GrantInformation_xml – fundername: Outstanding Young Research Fund of Shaanxi Province
  grantid: 2018JC-003
– fundername: National Natural Science Foundation of China
  grantid: 61671364; 61701390
  funderid: 10.13039/501100001809
– fundername: China Postdoctoral Science Foundation
  grantid: 2017M613140; 2018T111064
  funderid: 10.13039/501100002858
GroupedDBID -~X
.DC
0R~
29I
3EH
4.4
5GY
5VS
6IK
85S
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABFSI
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
ACKIV
ACNCT
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
E.L
EBS
EJD
HZ~
H~9
IAAWW
IBMZZ
ICLAB
IES
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
RIA
RIE
RNS
TAE
TN5
VH1
ZCA
ZCG
AAYOK
AAYXX
CITATION
RIG
7SP
8FD
L7M
ID FETCH-LOGICAL-c295t-4aa1a8993908872362393cbe02d4f2bc372ec4682a91007471cd05990d25154f3
IEDL.DBID RIE
ISSN 0090-6778
IngestDate Mon Jun 30 10:14:47 EDT 2025
Thu Apr 24 23:04:16 EDT 2025
Tue Jul 01 02:51:28 EDT 2025
Wed Aug 27 03:03:27 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c295t-4aa1a8993908872362393cbe02d4f2bc372ec4682a91007471cd05990d25154f3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-8730-5063
0000-0002-8207-5596
0000-0003-4107-9512
PQID 2180066458
PQPubID 85472
PageCount 14
ParticipantIDs proquest_journals_2180066458
ieee_primary_8528513
crossref_citationtrail_10_1109_TCOMM_2018_2880216
crossref_primary_10_1109_TCOMM_2018_2880216
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2019-02-01
PublicationDateYYYYMMDD 2019-02-01
PublicationDate_xml – month: 02
  year: 2019
  text: 2019-02-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on communications
PublicationTitleAbbrev TCOMM
PublicationYear 2019
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref15
akgun (ref33) 2015
ref14
ref11
ref10
ref17
ref16
ref19
ref18
ref50
ref46
ref45
ref48
ref47
ref42
ref41
ref44
ref43
ref8
ref7
ref9
ref4
ref3
ref6
ref5
ref40
(ref37) 2014
ref35
ref34
ref36
ref31
ref30
ref32
ref2
ref1
ref39
ref38
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref28
ref27
stoyan (ref51) 1996
ref29
gradshteyn (ref49) 2007
References_xml – year: 1996
  ident: ref51
  publication-title: Stochastic Geometry and its Applications
– ident: ref38
  doi: 10.1109/JSAC.2009.090902
– ident: ref23
  doi: 10.1109/MCOM.2015.7105651
– ident: ref15
  doi: 10.1007/s11432-011-4306-8
– ident: ref21
  doi: 10.1145/2534169.2486033
– ident: ref35
  doi: 10.1109/TIFS.2018.2834301
– ident: ref30
  doi: 10.1109/TCOMM.2016.2641949
– ident: ref10
  doi: 10.1109/TSP.2012.2191543
– ident: ref46
  doi: 10.1016/j.sigpro.2014.09.025
– ident: ref47
  doi: 10.1109/TWC.2015.2445776
– ident: ref26
  doi: 10.1109/TWC.2012.102612.111278
– ident: ref43
  doi: 10.1109/WCL.2013.030613.130023
– ident: ref36
  doi: 10.1109/MCOM.2017.1600264
– ident: ref17
  doi: 10.1109/TCOMM.2018.2821158
– ident: ref24
  doi: 10.1109/TSP.2011.2164910
– ident: ref12
  doi: 10.1109/TSP.2010.2092774
– ident: ref14
  doi: 10.1109/TWC.2014.2354635
– ident: ref45
  doi: 10.1109/TWC.2013.010214.130226
– ident: ref9
  doi: 10.1109/TSP.2011.2172433
– ident: ref27
  doi: 10.1109/WCSP.2015.7341300
– ident: ref28
  doi: 10.1109/TIFS.2017.2656462
– ident: ref31
  doi: 10.1109/TSP.2017.2701318
– start-page: 1
  year: 2015
  ident: ref33
  article-title: Receiver-based friendly jamming with single-antenna full-duplex receivers in a multiuser broadcast channel
  publication-title: Proc IEEE Globecom
– ident: ref34
  doi: 10.1109/TWC.2017.2755640
– ident: ref8
  doi: 10.1109/TSP.2015.2465301
– ident: ref22
  doi: 10.1109/JSAC.2014.2330193
– ident: ref25
  doi: 10.1109/ACSSC.2010.5757643
– ident: ref42
  doi: 10.1109/TWC.2017.2689005
– ident: ref18
  doi: 10.1109/COMST.2014.2319555
– ident: ref50
  doi: 10.1017/CBO9780511804441
– ident: ref48
  doi: 10.1109/MCOM.2014.6807946
– ident: ref19
  doi: 10.1109/JSYST.2014.2298837
– ident: ref1
  doi: 10.1002/j.1538-7305.1975.tb02040.x
– ident: ref3
  doi: 10.1109/MCOM.2015.7081071
– ident: ref13
  doi: 10.1109/TIFS.2013.2287046
– ident: ref6
  doi: 10.1109/TWC.2014.2332164
– ident: ref11
  doi: 10.1109/TSP.2009.2038412
– ident: ref5
  doi: 10.1109/TSP.2010.2078810
– ident: ref29
  doi: 10.1109/TWC.2016.2633336
– ident: ref2
  doi: 10.1109/TIT.1978.1055917
– ident: ref16
  doi: 10.1109/TWC.2009.080511
– ident: ref44
  doi: 10.1109/GLOCOM.2016.7842253
– year: 2007
  ident: ref49
  publication-title: Table of Integrals Series and Products
– year: 2014
  ident: ref37
  publication-title: Study on LTE Device to Device Proximity Services
– ident: ref40
  doi: 10.1109/COMST.2016.2624939
– ident: ref4
  doi: 10.1109/MCOM.2015.7355565
– ident: ref7
  doi: 10.1109/TSP.2010.2094610
– ident: ref20
  doi: 10.1109/COMST.2017.2649687
– ident: ref39
  doi: 10.1109/TCOMM.2016.2519402
– ident: ref41
  doi: 10.1109/TWC.2016.2622689
– ident: ref32
  doi: 10.1109/TSP.2013.2269049
SSID ssj0004033
Score 2.4304495
Snippet Device-to-device (D2D) communication raises new transmission secrecy protection challenges, since conventional physical layer security approaches, such as...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1254
SubjectTerms Complexity theory
device-to-device (D2D) communication
Device-to-device communication
Eavesdropping
full-duplex (FD)
Jamming
Physical layer security
Receivers
Secrecy aspects
secrecy outage
secrecy throughput
stochastic geometry
Switches
Switching theory
Throughput
Title Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks
URI https://ieeexplore.ieee.org/document/8528513
https://www.proquest.com/docview/2180066458
Volume 67
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH64nfTgrylOp-TgTbu1adI2x-GUMaiCKOxW8msgbt1wK4h_vUnazqEi3gpNSshL876XfO97AJfGqVKhie_ZIlYeUYp5grDI00qQOCKBSFxuVXofDZ_JaEzHW3C9zoXRWjvyme7aR3eXr-aysEdlvYRiAxDCBjRM4Fbman3lQPphpThp6exxUifI-Kz3dPOQppbFlXSxWa7Y1jbfcEKuqsqPrdj5l7s9SOuRlbSS126xEl358U208b9D34fdCmiifrkyDmBL54ewsyE_2IK0r_jCbnfIBqLeoFhM9Tsa8dnMvEYGUGpL2kAG1iJ3LK_RAA-QjV6X6CVHjzxX8xm6L4nkyyN4vrt9uhl6VXkFT2JGVx7hPOAm3Aot1SnGxpOFLJRC-1iRCRYyjLGWJEowZ4HT2Q-ksmouvjKYiJJJeAzNfJ7rE0CJpDgOgigiE2p6xImMolgxrinXgfBlG4J6vjNZaY_bEhjTzMUgPsucjTJro6yyURuu1n0WpfLGn61bdtLXLav5bkOnNmtW_ZzLzKAai7QITU5_73UG2-bbrCRnd6C5eiv0ucEeK3HhFt0n2a_RIw
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwFD54eVAfvIvTqXnwTTubNGmbx-GUeekEmeBbyW0gum64DcRfb5J2U1TEt0ITGnLSnO8k3_kOwLF1qkwaGgauiFVAteaBpDwOjJY0iSmWqc-tyjpx-4FeP7LHOTid5cIYYzz5zDTco7_L1wM1cUdlZykjFiBE87Bo_T7DZbbWZxZkGFWak47QnqTTFJmQn3XP77LM8bjSBrELlrjq5l_ckK-r8mMz9h7mcg2y6dhKYslzYzKWDfX-Tbbxv4Nfh9UKaqJmuTY2YM4Um7DyRYBwC7KmFkO34SEXigatyfDFvKFr0e_b18hCSuNoG8gCW-QP5g1qkRZy8esIPRXoXhR60Eedkko-2oaHy4vueTuoCiwEinA2DqgQWNiAK3Jkp4RYXxbxSEkTEk17RKooIUbROCWCY6-0j5V2ei6htqiI0V60AwvFoDC7gFLFSIJxHNMesz2SVMVxorkwTBgsQ1UDPJ3vXFXq464Ixkvuo5CQ595GubNRXtmoBiezPsNSe-PP1ltu0mctq_muQX1q1rz6PUe5xTUOa1GW7v3e6wiW2t3sNr-96tzsw7L9Di-p2nVYGL9OzIFFImN56BfgB_GV1Gw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Adaptive+Full-Duplex+Jamming+Receiver+for+Secure+D2D+Links+in+Random+Networks&rft.jtitle=IEEE+transactions+on+communications&rft.au=Hui-Ming%2C+Wang&rft.au=Bing-Qing+Zhao&rft.au=Tong-Xing%2C+Zheng&rft.date=2019-02-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=0090-6778&rft.eissn=1558-0857&rft.volume=67&rft.issue=2&rft.spage=1254&rft_id=info:doi/10.1109%2FTCOMM.2018.2880216&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0090-6778&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0090-6778&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0090-6778&client=summon