Premium
Jamming partner selection for maximising the worst D2D secrecy rate based on social trust
Author(s) -
Wang Li,
Wu Huaqing
Publication year - 2017
Publication title -
transactions on emerging telecommunications technologies
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.366
H-Index - 47
ISSN - 2161-3915
DOI - 10.1002/ett.2992
Subject(s) - eavesdropping , jamming , computer science , secrecy , computer network , channel state information , heuristic , computer security , channel (broadcasting) , node (physics) , transmitter power output , selection (genetic algorithm) , wireless , telecommunications , engineering , transmitter , physics , structural engineering , artificial intelligence , thermodynamics
Device‐to‐device (D2D) communications have recently attracted broad attention, owing to its potential ability to improve spectrum and energy efficiency within the existing cellular infrastructure. Without sophisticated control, D2D users themselves are not powerful enough to resist eavesdropping or fight against security attacks. This work investigates how to select jamming partners for D2D users to thwart eavesdroppers by exploiting social relationship with the help of full channel state information (CSI) and partial CSI, respectively. We aim to maximise the worst‐case eavesdropping by selecting jammer node and allocating transmit power for both source and jammer nodes. We first present a heuristic genetic algorithm‐based solution to address the problem. We then propose low‐complexity optimisation solutions by considering the upper and lower bounds of power allocation. Numerical results show that the proposed schemes can achieve better performance through finding an appropriate partner. Copyright © 2015 John Wiley & Sons, Ltd.