Abstract

This paper investigates the physical layer security and data transmission for the underlay device-to-device (D2D) networks, and considers a combination of the reconfigurable intelligent surface (RIS) and full-duplex (FD) jamming receiver for the robustness and security enhancements of the system. In the demonstrated spectrum sharing setup, the total power of the D2D networks is conceived to the transmitter and receiver to transmit a private message and emit the artificial noise (AN) signals. To prevent information leakage, a beamforming design is presented for a multi-antenna FD D2D receiver in order to suppress and inject the AN signals in the direction of legitimate users and eavesdropper, respectively. The statistical characterization of end-to-end RIS-assisted wireless channels is presented, and the achievable ergodic secrecy rate of the system is derived in novel approximate expressions. The numerical and simulation results confirm the accuracy and effectiveness of the proposed analytical framework. The results demonstrate an optimal selection of the D2D power allocations for different number of reflecting elements in terms of achievable ergodic secrecy rates of the system.

Highlights

  • Over the past few years, the revolutionary progress in wireless communication protocols, computing capabilities, and sensors has enabled a new technology paradigm, i.e., Internet of Things (IoT)

  • The benchmark scheme in [32] is plotted in which the jamming signals for the cellular network were provided via a D2D reconfigurable intelligent surface (RIS)-cascaded channel, and only a direct link was used for a cellular user

  • In order to evaluate the performance of the cellular network comprehensively, the baseline scheme is plotted in which the cellular networks used only a RIS-cascaded channel, and were not provided the jamming signals

Read more

Summary

INTRODUCTION

Over the past few years, the revolutionary progress in wireless communication protocols, computing capabilities, and sensors has enabled a new technology paradigm, i.e., Internet of Things (IoT). The application of PLS was extended to the D2D communications underlaying cellular networks where the system interference was utilized to enhance the secrecy performance [28], [29]. Such a scenario provided a win-win situation as each node simultaneously achieved its own transmission. Underlay D2D networks were analyzed in a typical setting of the spectrum sharing, i.e., a D2D transmitter secured the cellular network via jamming signals, using either a relay or a direct link [32]. The results suggest an optimization of D2D power allocations for the achievable ergodic secrecy rates of the system and provide valuable insights for an optimal selection with respect to number of reflecting elements

NOTATIONS AND PAPER ORGANIZATION N otation
NETWORK DESCRIPTION
E2E LEGITIMATE CHANNEL IN CELLULAR
E2E LEGITIMATE CHANNEL IN D2D NETWORK
E2E EAVESDROPPING CHANNELS
ACHIEVABLE ERGODIC RATE FOR CELLULAR LEGITIMATE USER
ACHIEVABLE ERGODIC RATE FOR D2D LEGITIMATE USER
ACHIEVABLE ERGODIC RATE FOR EAVESDROPPER
ACHIEVABLE ERGODIC SECRECY RATE OF THE SYSTEM
NUMERICAL RESULTS
PERFORMANCE OF THE CELLULAR NETWORKS
PERFORMANCE OF THE OVERALL SYSTEM
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.