Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Secure Wireless Powered and Cooperative Jamming D2D Communications
Date
2017-10-01
Author
Chu, Zheng
Nguyen, Huan X
Le, Tuan Anh
Karamanoglu, Mehmet
EVER, ENVER
Yazıcı, Adnan
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
236
views
0
downloads
Cite This
This paper investigates a secure wireless-powered device-to-device (D2D) communication network in the presence of multiple eavesdroppers, where a hybrid base station (BS) in a cellular network not only provides power wirelessly for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer to interfere with the eavesdroppers. The cellular and D2D networks can belong to different service providers, which means that the D2D transmitter would need to pay for the energy service released by the hybrid BS to guarantee secure D2D communication. In order to exploit the hierarchical interaction between the BS and the D2D transmitter, we first formulate a Stackelberg game based energy trading scheme, where the quadratic energy cost model is considered. Then, a nonenergy trading based Stackelberg game is investigated to study the reversed roles of the BS and the D2D users. For comparison, we also formulate and resolve the social welfare optimization problem. We derive the closed-form Stackelberg equilibriums of the formulated games and the optimal solutions for the social welfare optimization problem. Simulation results are provided to validate our proposed schemes to highlight the importance of energy trading interaction between cellular and D2D networks.
Subject Keywords
Wireless powered communication networks (WPCNs)
,
physical-layer secrecy
,
device-to-device (D2D)
,
cooperative jammer (CJ)
,
Stackelberg game
URI
https://hdl.handle.net/11511/69619
Journal
IEEE Transactions on Green Communications and Networking
DOI
https://doi.org/10.1109/tgcn.2017.2763826
Collections
Department of Computer Engineering, Article
Suggestions
OpenMETU
Core
Game Theory Based Secure Wireless Powered D2D Communications with Cooperative Jamming
Chu, Zheng; Nguyen, Huan X.; Tuan Anh Le, Tuan Anh Le; Karamanoglu, Mehmet; Duc To, Duc To; Ever, Enver; Al-Turjman, Fadi; Yazıcı, Adnan (2017-03-31)
In this paper, we consider a secure wireless powered device-to-device (D2D) communication in the presence of the multiple eavesdroppers, where a smart hybrid base station (BS) in cellular network not only charges for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer (CJ) to interfere with the eavesdroppers. Although the cellular networks share their own spectrum with the D2D underlay network, both of them may not belong to the same service provide...
Network-wide energy efficiency in wireless networks with multiple access points
Ozel, Omur; Uysal, Elif (2013-10-01)
This paper presents a distributed mechanism for improving the overall energy efficiency of a wireless network where users can control their uplink transmit power targeted to the multiple access points in the network. This mechanism lets the network achieve a trade-off between energy efficiency and spectral efficiency through the use of suitably designed utility functions. A user's utility is a function of throughput and average transmission power. Throughput is assumed to be a sigmoidal function of signal-t...
Path planning and localization for mobile anchor based wireless sensor networks
Erdemir, Ecenaz; Tuncer, Temel Engin; Department of Electrical and Electronics Engineering (2017)
In wireless sensor networks, sensors with limited resources are distributed in a wide area. Localizing the sensors is an important problem. Anchor nodes with known positions are used for sensor localization. A simple and efficient way of generating anchor nodes is to use mobile anchors which have built-in GPS units. In this thesis, a single mobile anchor is used to traverse the region of interest to communicate with the sensor nodes and identify their positions. Therefore planning the best trajectory for th...
Multimedia communication in wireless sensor networks
Gurses, E; Akan, OB (2005-07-01)
The technological advances in Micro ElectroMechanical Systems (MEMS) and wireless communications have enabled the realization of wireless sensor networks (WSN) comprised of large number of low-cost, low-power multifunctional sensor nodes. These tiny sensor nodes communicate in short distances and collaboratively work toward fulfilling the application specific objectives of WSN. However, realization of wide range of envisioned WSN applications necessitates effective communication protocols which can address ...
Wireless sensor networks for security: Issues and challenges
Onel, T; Onur, Ertan; Ersoy, C; Delic, H (2006-01-01)
In this chapter, the sensing coverage area of surveillance wireless sensor networks is considered. The sensing coverage is determined by applying Neyman-Pearson detection and defining the breach probability on a grid-modeled field. Using a graph model for the perimeter, Dijkstra's shortest path algorithm is used to find the weakest breach path. The breach probability is linked to parameters such as the false alarm rate, size of the data record and the signal-to-noise ratio. Consequently, the required number...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
Z. Chu, H. X. Nguyen, T. A. Le, M. Karamanoglu, E. EVER, and A. Yazıcı, “Secure Wireless Powered and Cooperative Jamming D2D Communications,”
IEEE Transactions on Green Communications and Networking
, pp. 1–13, 2017, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/69619.