Abstract
This paper investigates the physical layer security and data transmission for the underlay device-to-device (D2D) networks, and considers a combination of the reconfigurable intelligent surface (RIS) and full-duplex (FD) jamming receiver for the robustness and security enhancements of the system. In the demonstrated spectrum sharing setup, the total power of the D2D networks is conceived to the transmitter and receiver to transmit a private message and emit the artificial noise (AN) signals. To prevent information leakage, a beamforming design is presented for a multi-antenna FD D2D receiver in order to suppress and inject the AN signals in the direction of legitimate users and eavesdropper, respectively. The statistical characterization of end-to-end RIS-assisted wireless channels is presented, and the achievable ergodic secrecy rate of the system is derived in novel approximate expressions. The numerical and simulation results confirm the accuracy and effectiveness of the proposed analytical framework. The results demonstrate an optimal selection of the D2D power allocations for different number of reflecting elements in terms of achievable ergodic secrecy rates of the system.
Highlights
Over the past few years, the revolutionary progress in wireless communication protocols, computing capabilities, and sensors has enabled a new technology paradigm, i.e., Internet of Things (IoT)
The benchmark scheme in [32] is plotted in which the jamming signals for the cellular network were provided via a D2D reconfigurable intelligent surface (RIS)-cascaded channel, and only a direct link was used for a cellular user
In order to evaluate the performance of the cellular network comprehensively, the baseline scheme is plotted in which the cellular networks used only a RIS-cascaded channel, and were not provided the jamming signals
Summary
Over the past few years, the revolutionary progress in wireless communication protocols, computing capabilities, and sensors has enabled a new technology paradigm, i.e., Internet of Things (IoT). The application of PLS was extended to the D2D communications underlaying cellular networks where the system interference was utilized to enhance the secrecy performance [28], [29]. Such a scenario provided a win-win situation as each node simultaneously achieved its own transmission. Underlay D2D networks were analyzed in a typical setting of the spectrum sharing, i.e., a D2D transmitter secured the cellular network via jamming signals, using either a relay or a direct link [32]. The results suggest an optimization of D2D power allocations for the achievable ergodic secrecy rates of the system and provide valuable insights for an optimal selection with respect to number of reflecting elements
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.