Secure Transmission Design for Virtual Antenna Array-Aided Device-to-Device Multicast Communications

نویسندگان

چکیده

This paper investigates the physical-layer security in a Virtual Antenna Array (VAA)-aided Device-to-Device Multicast (D2DM) communication system, where User Equipments (UEs) who cache common content will form VAA system and cooperatively multicast to UEs desire it. Specifically, with target of securing VAA-aided D2DM under threat multiple eavesdroppers, we propose secure beamforming scheme by jointly considering formed Base Station (BS). For obtaining optimal beamforing vectors, nonsmooth nonconvex Weight Sum Rate Maximization Problem (WRMP) is formulated solved using Successive Convex Approximation (SCA) approach. Furthermore, consider worst case that eavesdroppers eavesdrop enhance overhearing capacity. In case, modify scheme, formulate corresponding WRMP solve it two-level optimization. Simulation results validate improvements terms compared conventional schemes.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Analysis of Device to Device Communications Overlaying/Underlaying Cellular Network

Minimizing the outage probability and maximizing throughput are two important aspects in device to device (D2D) communications, which are greatly related to each other. In this paper, first, the exact formulas of the outage probability for D2D communications underlaying or overlaying cellular network are derived which jointly experience Additive White Gaussian Noise (AWGN) and Rayleigh multipat...

متن کامل

Device-to-Device Aided Multicasting

We consider a device-to-device (D2D) aided multicast channel, where a transmitter wishes to convey a common message to many receivers and these receivers cooperate with each other. We propose a simple computationally efficient scheme requiring only statistical channel knowledge at transmitter. Our analysis in general topologies reveals that, when the number of receivers K grows to infinity, the...

متن کامل

Power Efficiency for Device-to-Device Communications

The concept of device-to-Device (D2D) communication as an underlay coexistence with cellular networks gains many advantages of improving system performance. In this paper, we model such a two-layer heterogenous network based on stochastic geometry approach. We aim at minimizing the expected power consumption of the D2D layer while satisfying the outage performance of both D2D layer and cellular...

متن کامل

Social-Aware Relay Selection for Cooperative Multicast Device-to-Device Communications

The increasing use of social networks such as Facebook, Twitter, and Instagram to share photos, video streaming, and music among friends has generated a huge increase in the amount of data traffic over wireless networks. This social behavior has triggered new communication paradigms such as device-to-device (D2D) and relaying communication schemes, which are both considered as strong drivers fo...

متن کامل

Performance analysis of the link selection for secure device-to-device communications with an untrusted relay

In this paper, we study the performance of the selection combining and switch and stay combining methods in secure cooperative device-to-device (D2D) communications underlying a cellular network where an untrusted amplify and forward relay helps D2D communications. In our model, we specifically consider the interference from the cellular system over the D2D pair and the interference from the D2...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Wireless Communications

سال: 2023

ISSN: ['1536-1276', '1558-2248']

DOI: https://doi.org/10.1109/twc.2022.3229077