Pub Date : 2021-06-01DOI: 10.1109/ICT52184.2021.9511541
Bassant Tolba, A. El-Malek, M. Abo-Zahhad, M. Elsabrouty
In massive multiple-input multiple-output frequency division duplexing systems, the user equipment should independently estimate the massive downlink channels state information and then feed them back to the base station. This process results in a large signaling overhead. Deep learning approaches tried to overcome this challenge using neural networks as an autoencoder to learn the mapping between the input and corresponding output. However, this type of learning consumes massive training datasets to learn. Also, it can not make use of the learning through the internal information within the tasks and thus, it can not reach the convergence quickly as its parameters are randomly initialized. In this paper, we introduce a meta learner-based autoencoder for tackling the feedback overhead. The proposed approach is mainly based on finding a good initialization of the parameters of the autoencoder to adapt rapidly to new tasks with a few number of samples. The results show that the proposed autoencoder based on the meta-learner method outperforms the state of the art with a margin.
{"title":"A Meta Learner Autoencoder for Channel State Information Feedback in Massive MIMO Systems","authors":"Bassant Tolba, A. El-Malek, M. Abo-Zahhad, M. Elsabrouty","doi":"10.1109/ICT52184.2021.9511541","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511541","url":null,"abstract":"In massive multiple-input multiple-output frequency division duplexing systems, the user equipment should independently estimate the massive downlink channels state information and then feed them back to the base station. This process results in a large signaling overhead. Deep learning approaches tried to overcome this challenge using neural networks as an autoencoder to learn the mapping between the input and corresponding output. However, this type of learning consumes massive training datasets to learn. Also, it can not make use of the learning through the internal information within the tasks and thus, it can not reach the convergence quickly as its parameters are randomly initialized. In this paper, we introduce a meta learner-based autoencoder for tackling the feedback overhead. The proposed approach is mainly based on finding a good initialization of the parameters of the autoencoder to adapt rapidly to new tasks with a few number of samples. The results show that the proposed autoencoder based on the meta-learner method outperforms the state of the art with a margin.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"2000 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125729000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this work, a non-binary low density parity check (LDPC) coded high dimensional multiple input multiple output (MIMO) scheme with partial mapping for high order modulation is proposed. For the proposed scheme, when $M$ -ary quadrature amplitude modulation (QAM) is employed, then non-binary LDPC code constructed over Galois field with order $sqrt{M}$ is used for partial mapping, where $sqrt{M}$ is an integer. At the receiver side, a real-valued expectation propagation (REP) based detection algorithm is used. Furthermore, symbol-wise extrinsic information transfer (SEXIT) chart based iterative optimization algorithm is used to optimize the concatenated non-binary LDPC code. A simplified method is proposed to calculate the component EXIT chart of the massive MIMO detector, which can avoid a large amount of simulations. Numerical simulation results demonstrate the validity of the above idea.
{"title":"Optimization of non-binary LDPC coded massive MIMO systems with partial mapping and EP detection","authors":"Zhi-Yuan Feng, Qingqing Liu, Jin Xu, Weihua Liu, Zhe Zhang, Xueyan Chen, Hanqing Ding","doi":"10.1109/ICT52184.2021.9511526","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511526","url":null,"abstract":"In this work, a non-binary low density parity check (LDPC) coded high dimensional multiple input multiple output (MIMO) scheme with partial mapping for high order modulation is proposed. For the proposed scheme, when $M$ -ary quadrature amplitude modulation (QAM) is employed, then non-binary LDPC code constructed over Galois field with order $sqrt{M}$ is used for partial mapping, where $sqrt{M}$ is an integer. At the receiver side, a real-valued expectation propagation (REP) based detection algorithm is used. Furthermore, symbol-wise extrinsic information transfer (SEXIT) chart based iterative optimization algorithm is used to optimize the concatenated non-binary LDPC code. A simplified method is proposed to calculate the component EXIT chart of the massive MIMO detector, which can avoid a large amount of simulations. Numerical simulation results demonstrate the validity of the above idea.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114452185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1109/ICT52184.2021.9511465
K. Vaishnavi, Shubham Dashrath Khorvi, Rajalekshmi Kishore, Sanjeev Gurugopinath
In this paper, we present a comprehensive survey on jamming techniques for physical layer security (PLS) and anti-jamming strategies in beyond fifth generation (B5G) and towards the sixth generation (6G) communication systems. A combined study on jamming and anti-jamming methods is important for PLS, and is helpful to study and design PLS algorithms in the presence of jamming, eavesdropping and spoofing. First, we present various approaches for PLS in 6G. Next, we discuss techniques that use jammers for PLS, followed by a detailed study on recently proposed anti-jamming solutions. Further, we discuss the use of machine learning and artificial intelligence for anti-jamming. Moreover, we present a study on the challenges for PLS in 6G, and discuss some future research directions.
{"title":"A Survey on Jamming Techniques in Physical Layer Security and Anti-Jamming Strategies for 6G","authors":"K. Vaishnavi, Shubham Dashrath Khorvi, Rajalekshmi Kishore, Sanjeev Gurugopinath","doi":"10.1109/ICT52184.2021.9511465","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511465","url":null,"abstract":"In this paper, we present a comprehensive survey on jamming techniques for physical layer security (PLS) and anti-jamming strategies in beyond fifth generation (B5G) and towards the sixth generation (6G) communication systems. A combined study on jamming and anti-jamming methods is important for PLS, and is helpful to study and design PLS algorithms in the presence of jamming, eavesdropping and spoofing. First, we present various approaches for PLS in 6G. Next, we discuss techniques that use jammers for PLS, followed by a detailed study on recently proposed anti-jamming solutions. Further, we discuss the use of machine learning and artificial intelligence for anti-jamming. Moreover, we present a study on the challenges for PLS in 6G, and discuss some future research directions.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134337882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1109/ICT52184.2021.9511462
Degang Sun, Sixue Lu, Wen Wang
To sense and understand how to use the wireless spectrum, people have proposed various anomaly spectrum detection methods. We judge it as anomaly behavior if the received signal is unauthorized or the radiation of an expected signal is changed. We propose CAAE, a novel wireless spectrum anomaly detection method, to detect the two kinds of anomaly behaviors. CAAE is a complex adversarial autoencoder that can realize feature extraction and image reconstruction of input data through convolution and deconvolution networks. We train CAAE in a semi-supervised learning fashion and various values in the calculation process would change if the anomaly spectrum is input after the model training is completed. Therefore, we propose the multiple scoring criterion to help improve the detection accuracy of our model. The time-frequency waterfall graphs are input and we do two sets of experiments to prove the validity of our model. The experimental results show that the comprehensive detection capability of CAAE model is superior to the comparison algorithms for our dataset.
{"title":"CAAE: A Novel Wireless Spectrum Anomaly Detection Method with Multiple Scoring Criterion","authors":"Degang Sun, Sixue Lu, Wen Wang","doi":"10.1109/ICT52184.2021.9511462","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511462","url":null,"abstract":"To sense and understand how to use the wireless spectrum, people have proposed various anomaly spectrum detection methods. We judge it as anomaly behavior if the received signal is unauthorized or the radiation of an expected signal is changed. We propose CAAE, a novel wireless spectrum anomaly detection method, to detect the two kinds of anomaly behaviors. CAAE is a complex adversarial autoencoder that can realize feature extraction and image reconstruction of input data through convolution and deconvolution networks. We train CAAE in a semi-supervised learning fashion and various values in the calculation process would change if the anomaly spectrum is input after the model training is completed. Therefore, we propose the multiple scoring criterion to help improve the detection accuracy of our model. The time-frequency waterfall graphs are input and we do two sets of experiments to prove the validity of our model. The experimental results show that the comprehensive detection capability of CAAE model is superior to the comparison algorithms for our dataset.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131232790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1109/ICT52184.2021.9511515
P. Prior, Nuno Cota
This paper presents the evaluation results of the radio signal propagation prediction using Longley-Rice model in railways installed in rural areas with significant variation of propagation path and terrain profiles. The prediction results were compared with measurement acquired by installing several CW emitters along the railway and reception equipment installed on a rolling stock. In addition, the results were also compared with the prediction based on Okumura-Hata model. The obtained results prove Longley-Rice suitability for railways communication prediction on irregular terrain, achieving better results than the Okumura-Hata model.
{"title":"Railways Communications Propagation Prediction over Irregular Terrain using Longley-Rice Model","authors":"P. Prior, Nuno Cota","doi":"10.1109/ICT52184.2021.9511515","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511515","url":null,"abstract":"This paper presents the evaluation results of the radio signal propagation prediction using Longley-Rice model in railways installed in rural areas with significant variation of propagation path and terrain profiles. The prediction results were compared with measurement acquired by installing several CW emitters along the railway and reception equipment installed on a rolling stock. In addition, the results were also compared with the prediction based on Okumura-Hata model. The obtained results prove Longley-Rice suitability for railways communication prediction on irregular terrain, achieving better results than the Okumura-Hata model.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124885697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1109/ICT52184.2021.9511544
J. Costa-Requena, C. Konstantinos, D. Kritharidis, Abraham Afriyie, N. Carapellese, Eduardo Yusta Padilla
With the explosive data growth of user traffic in wireless communications, Terahertz (THz) frequency band is envisioned as a promising candidate to support ultra-broadband communications for beyond fifth generation (5G) networks. Software-based networking is being adopted in mobile communications to improve efficiency and reduce operational costs. This paper presents the design of a comprehensive SDN management architecture for joint optimization of radio and network resources. The proposed architecture obtains the most added value out of the use of THz technology integrated with software managed networking for mobile network beyond 5G. In this paper, leveraging optical concepts and photonic integration techniques for an ultra-broadband and ultra-wideband wireless system is presented.
{"title":"SDN-enabled terahertz x-haul network","authors":"J. Costa-Requena, C. Konstantinos, D. Kritharidis, Abraham Afriyie, N. Carapellese, Eduardo Yusta Padilla","doi":"10.1109/ICT52184.2021.9511544","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511544","url":null,"abstract":"With the explosive data growth of user traffic in wireless communications, Terahertz (THz) frequency band is envisioned as a promising candidate to support ultra-broadband communications for beyond fifth generation (5G) networks. Software-based networking is being adopted in mobile communications to improve efficiency and reduce operational costs. This paper presents the design of a comprehensive SDN management architecture for joint optimization of radio and network resources. The proposed architecture obtains the most added value out of the use of THz technology integrated with software managed networking for mobile network beyond 5G. In this paper, leveraging optical concepts and photonic integration techniques for an ultra-broadband and ultra-wideband wireless system is presented.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130301296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming at the problem of identification of a large number of radio stations in the high frequency (HF) band, a fast identification method based on sparse component analysis, in which high-speed spectrum scanning data are used to separate and identify multiple stations on each channel, is proposed. Taking into account the adverse effects of the shortwave time-varying channel fading on the radio signals, utilizing the periodicity of the radio signals, a sparse component analysis algorithm based on time feature clustering (TFC-SCA) is proposed. The algorithm combines the time features with the amplitude features for clustering and realizes the accurate estimation of the mixing matrix under fading channel conditions. In addition, based on the clustering results, the algorithm projects the signals to the vectors from the origin to the clustering centers to remove the noise introduced by the time-varying channel fading. In simulation experiments with different duty cycles and different periods, the correlation coefficients of TFC-SCA are closer to 1 than clustering based sparse component analysis (C-SCA) and fast independent component analysis (FastICA), providing a good solution to the problem of separation and identification of shortwave radio stations.
{"title":"A Fast Identification Method of Shortwave Radio Stations Based on Sparse Component Analysis","authors":"Yuankun Wang, Wei-qing Huang, Qiaoyu Zhang, Dong Wei","doi":"10.1109/ICT52184.2021.9511543","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511543","url":null,"abstract":"Aiming at the problem of identification of a large number of radio stations in the high frequency (HF) band, a fast identification method based on sparse component analysis, in which high-speed spectrum scanning data are used to separate and identify multiple stations on each channel, is proposed. Taking into account the adverse effects of the shortwave time-varying channel fading on the radio signals, utilizing the periodicity of the radio signals, a sparse component analysis algorithm based on time feature clustering (TFC-SCA) is proposed. The algorithm combines the time features with the amplitude features for clustering and realizes the accurate estimation of the mixing matrix under fading channel conditions. In addition, based on the clustering results, the algorithm projects the signals to the vectors from the origin to the clustering centers to remove the noise introduced by the time-varying channel fading. In simulation experiments with different duty cycles and different periods, the correlation coefficients of TFC-SCA are closer to 1 than clustering based sparse component analysis (C-SCA) and fast independent component analysis (FastICA), providing a good solution to the problem of separation and identification of shortwave radio stations.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117011440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1109/ICT52184.2021.9511518
A. Faid, M. Sadik, Essaid Sabir
The role of Wireless Sensor Networks in the ongoing industrial development is becoming crucial on daily basis. It is undoubtedly the skeleton of the current global digital transformation and the fourth industrial revolution. WSN has grown into an emerging field of research due to its tremendous opportunities and several challenges. Machine to Machine (M2M), energy consumption, and wireless transmission are the most challenging areas of research with a plethora of solid papers that have been published in the last decade. Unquestionably, Low-Energy Adaptive Clustering Hierarchy (LEACH) is the most famous clustering protocol in the literature that allows the creation of self-organizing networks. However, the protocol presents several drawbacks in terms of cluster balancing, random CH selection, and single-hop communication. In this paper, we propose a hybrid energy-aware multi-hop clustering algorithm for WSN's self-organization and energy efficiency. The approach is based on the combination of K-medoids and LEACH clustering approach with a trade-off philosophy for the network clustering and eventual energy enhancement. The technique applies different energy ranges for a self-aware gateways' selection, along with the application of K-medoids, and LEACH for the building of dynamic clusters. The results are compared to the LEACH and K-medoids algorithms. Extensive simulation runs have shown a very good improvement in the network's performance based on the first dead node, the network lifetime, and the energy dissipation metrics. The algorithm's results show an improvement of 158% comparing to LEACH and 834% comparing to K-medoids in terms of the first dead node, while the network performance is enhanced by 151% comparing to LEACH and 33% comparing to K-medoids.
{"title":"EACA: An Energy Aware Clustering Algorithm for Wireless IoT Sensors","authors":"A. Faid, M. Sadik, Essaid Sabir","doi":"10.1109/ICT52184.2021.9511518","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511518","url":null,"abstract":"The role of Wireless Sensor Networks in the ongoing industrial development is becoming crucial on daily basis. It is undoubtedly the skeleton of the current global digital transformation and the fourth industrial revolution. WSN has grown into an emerging field of research due to its tremendous opportunities and several challenges. Machine to Machine (M2M), energy consumption, and wireless transmission are the most challenging areas of research with a plethora of solid papers that have been published in the last decade. Unquestionably, Low-Energy Adaptive Clustering Hierarchy (LEACH) is the most famous clustering protocol in the literature that allows the creation of self-organizing networks. However, the protocol presents several drawbacks in terms of cluster balancing, random CH selection, and single-hop communication. In this paper, we propose a hybrid energy-aware multi-hop clustering algorithm for WSN's self-organization and energy efficiency. The approach is based on the combination of K-medoids and LEACH clustering approach with a trade-off philosophy for the network clustering and eventual energy enhancement. The technique applies different energy ranges for a self-aware gateways' selection, along with the application of K-medoids, and LEACH for the building of dynamic clusters. The results are compared to the LEACH and K-medoids algorithms. Extensive simulation runs have shown a very good improvement in the network's performance based on the first dead node, the network lifetime, and the energy dissipation metrics. The algorithm's results show an improvement of 158% comparing to LEACH and 834% comparing to K-medoids in terms of the first dead node, while the network performance is enhanced by 151% comparing to LEACH and 33% comparing to K-medoids.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122902428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1109/ICT52184.2021.9511459
Olfa Ben Yahia, Eylem Erdogan, Günes Karabulut-Kurt, I. Altunbas, H. Yanikomeroglu
In this work, we propose a new physical layer security framework for optical space networks. More precisely, we consider two practical eavesdropping scenarios: free-space optical (FSO) eavesdropping in the space and FSO eavesdropping in the air. In the former, we assume that a high altitude platform station (HAPS) is trying to capture the confidential information from the low earth orbit (LEO) satellite, whereas in the latter, an unmanned aerial vehicle (UAV) eavesdropper is trying to intercept the confidential information from the HAPS node. To quantify the overall performance of both scenarios, we obtain closed-form secrecy outage probability (SOP) and probability of positive secrecy capacity (PPSC) expressions and validate with Monte Carlo simulations. Furthermore, we provide important design guidelines that can be helpful in the design of secure non-terrestrial networks.
{"title":"Physical Layer Security Framework for Optical Non-Terrestrial Networks","authors":"Olfa Ben Yahia, Eylem Erdogan, Günes Karabulut-Kurt, I. Altunbas, H. Yanikomeroglu","doi":"10.1109/ICT52184.2021.9511459","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511459","url":null,"abstract":"In this work, we propose a new physical layer security framework for optical space networks. More precisely, we consider two practical eavesdropping scenarios: free-space optical (FSO) eavesdropping in the space and FSO eavesdropping in the air. In the former, we assume that a high altitude platform station (HAPS) is trying to capture the confidential information from the low earth orbit (LEO) satellite, whereas in the latter, an unmanned aerial vehicle (UAV) eavesdropper is trying to intercept the confidential information from the HAPS node. To quantify the overall performance of both scenarios, we obtain closed-form secrecy outage probability (SOP) and probability of positive secrecy capacity (PPSC) expressions and validate with Monte Carlo simulations. Furthermore, we provide important design guidelines that can be helpful in the design of secure non-terrestrial networks.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125482814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1109/ICT52184.2021.9511539
Hao Wang, Shunliang Zhang, Qian Cheng
Securing communications for D2D underlaying cellular networks by physical layer mechanisms has become an important issue for 5G and beyond. The preference of D2D users and the role of D2D users as cooperative jammers are rarely investigated together in previous works. In this paper, we investigate spectrum resource allocation to maximize system secrecy sum rate and leverage D2D users to cooperatively protect cellular users at high risks of being eavesdropped. The resource allocation problem is formulated as a Mixed-Integer Non-Linear Programming (MINLP) model. We propose a preference-based matching algorithm (PBMA) to tackle the spectrum resource allocation problem. Then, cooperative jamming-based algorithms by D2D users assisted are proposed to further improve the secrecy rate of cellular users. Extensive simulation results demonstrate the effectiveness of proposed schemes in terms of the secrecy sum rate of D2D links and cellular links.
{"title":"Security Aware Resource Allocation for D2D Communications with cooperative Jamming","authors":"Hao Wang, Shunliang Zhang, Qian Cheng","doi":"10.1109/ICT52184.2021.9511539","DOIUrl":"https://doi.org/10.1109/ICT52184.2021.9511539","url":null,"abstract":"Securing communications for D2D underlaying cellular networks by physical layer mechanisms has become an important issue for 5G and beyond. The preference of D2D users and the role of D2D users as cooperative jammers are rarely investigated together in previous works. In this paper, we investigate spectrum resource allocation to maximize system secrecy sum rate and leverage D2D users to cooperatively protect cellular users at high risks of being eavesdropped. The resource allocation problem is formulated as a Mixed-Integer Non-Linear Programming (MINLP) model. We propose a preference-based matching algorithm (PBMA) to tackle the spectrum resource allocation problem. Then, cooperative jamming-based algorithms by D2D users assisted are proposed to further improve the secrecy rate of cellular users. Extensive simulation results demonstrate the effectiveness of proposed schemes in terms of the secrecy sum rate of D2D links and cellular links.","PeriodicalId":142681,"journal":{"name":"2021 28th International Conference on Telecommunications (ICT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130247831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}