当前位置: X-MOL 学术IEEE Trans. Commun. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Physical Layer Security in D2D Underlay Cellular Networks With Poisson Cluster Process
IEEE Transactions on Communications ( IF 8.3 ) Pub Date : 2020-11-01 , DOI: 10.1109/tcomm.2020.3017287
Jiawei Lyu , Hui-Ming Wang , Ke-Wen Huang

Device-to-device (D2D) communication is a promising solution to meet rapidly growing demands for data services via spectrum reuse. This paper studies the physical layer security in a D2D underlay cellular network from a network-wide perspective, where the locations of D2D and cellular users are modeled as Poisson cluster processes (PCPs) to characterize the clustering feature of D2D users, the locations of eavesdroppers (Eves) and base stations (BSs) are modeled as a PCP and Poisson point process (PPP), respectively. We establish an analytical framework to assess the coverage and security performance of the network. Two scenarios are considered, i.e., one D2D pair scenario and multiple D2D pairs scenario, where in each cell there is one or multiple D2D users (DUs) sharing the frequency spectrum with the cellular users (CUs) in each time slot of the TDMA scheme adopted by BSs. In each considered scenario, we derive exact expressions for the coverage outage probabilities (COPs) and secrecy outage probabilities (SOPs), respectively, for both the CUs and DUs. Furthermore, the exact expression for the network-wide secrecy throughput (ST) is derived. Numerical results are presented to verify our theoretical derivations and reveal some insights into the impact of various parameters on the system performance.

中文翻译:

具有泊松簇过程的 D2D 底层蜂窝网络中的物理层安全性

设备到设备 (D2D) 通信是一种很有前景的解决方案,可通过频谱重用满足快速增长的数据服务需求。本文从网络范围的角度研究了 D2D 底层蜂窝网络中的物理层安全性,其中 D2D 和蜂窝用户的位置被建模为泊松集群过程 (PCP),以表征 D2D 用户的集群特征,窃听者的位置(Eves) 和基站 (BS) 分别建模为 PCP 和泊松点过程 (PPP)。我们建立了一个分析框架来评估网络的覆盖范围和安全性能。考虑两种场景,即一个D2D对场景和多个D2D对场景,其中每个小区有一个或多个D2D用户(DU)在BS采用的TDMA方案的每个时隙中与蜂窝用户(CU)共享频谱。在每个考虑的场景中,我们分别为 CU 和 DU 推导出覆盖中断概率 (COP) 和保密中断概率 (SOP) 的精确表达式。此外,还推导出了全网保密吞吐量 (ST) 的精确表达式。给出了数值结果以验证我们的理论推导,并揭示了对各种参数对系统性能影响的一些见解。推导出全网保密吞吐量 (ST) 的精确表达式。给出了数值结果以验证我们的理论推导,并揭示了对各种参数对系统性能影响的一些见解。推导出全网保密吞吐量 (ST) 的精确表达式。给出了数值结果以验证我们的理论推导,并揭示了对各种参数对系统性能影响的一些见解。
更新日期:2020-11-01
down
wechat
bug