Secure Wireless Powered and Cooperative Jamming D2D Communications

2017-10-01
Chu, Zheng
Nguyen, Huan X
Le, Tuan Anh
Karamanoglu, Mehmet
EVER, ENVER
Yazıcı, Adnan
This paper investigates a secure wireless-powered device-to-device (D2D) communication network in the presence of multiple eavesdroppers, where a hybrid base station (BS) in a cellular network not only provides power wirelessly for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer to interfere with the eavesdroppers. The cellular and D2D networks can belong to different service providers, which means that the D2D transmitter would need to pay for the energy service released by the hybrid BS to guarantee secure D2D communication. In order to exploit the hierarchical interaction between the BS and the D2D transmitter, we first formulate a Stackelberg game based energy trading scheme, where the quadratic energy cost model is considered. Then, a nonenergy trading based Stackelberg game is investigated to study the reversed roles of the BS and the D2D users. For comparison, we also formulate and resolve the social welfare optimization problem. We derive the closed-form Stackelberg equilibriums of the formulated games and the optimal solutions for the social welfare optimization problem. Simulation results are provided to validate our proposed schemes to highlight the importance of energy trading interaction between cellular and D2D networks.
IEEE Transactions on Green Communications and Networking

Suggestions

Game Theory Based Secure Wireless Powered D2D Communications with Cooperative Jamming
Chu, Zheng; Nguyen, Huan X.; Tuan Anh Le, Tuan Anh Le; Karamanoglu, Mehmet; Duc To, Duc To; Ever, Enver; Al-Turjman, Fadi; Yazıcı, Adnan (2017-03-31)
In this paper, we consider a secure wireless powered device-to-device (D2D) communication in the presence of the multiple eavesdroppers, where a smart hybrid base station (BS) in cellular network not only charges for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer (CJ) to interfere with the eavesdroppers. Although the cellular networks share their own spectrum with the D2D underlay network, both of them may not belong to the same service provide...
Path planning and localization for mobile anchor based wireless sensor networks
Erdemir, Ecenaz; Tuncer, Temel Engin; Department of Electrical and Electronics Engineering (2017)
In wireless sensor networks, sensors with limited resources are distributed in a wide area. Localizing the sensors is an important problem. Anchor nodes with known positions are used for sensor localization. A simple and efficient way of generating anchor nodes is to use mobile anchors which have built-in GPS units. In this thesis, a single mobile anchor is used to traverse the region of interest to communicate with the sensor nodes and identify their positions. Therefore planning the best trajectory for th...
Network-wide energy efficiency in wireless networks with multiple access points
Ozel, Omur; Uysal, Elif (2013-10-01)
This paper presents a distributed mechanism for improving the overall energy efficiency of a wireless network where users can control their uplink transmit power targeted to the multiple access points in the network. This mechanism lets the network achieve a trade-off between energy efficiency and spectral efficiency through the use of suitably designed utility functions. A user's utility is a function of throughput and average transmission power. Throughput is assumed to be a sigmoidal function of signal-t...
Multimedia communication in wireless sensor networks
Gurses, E; Akan, OB (2005-07-01)
The technological advances in Micro ElectroMechanical Systems (MEMS) and wireless communications have enabled the realization of wireless sensor networks (WSN) comprised of large number of low-cost, low-power multifunctional sensor nodes. These tiny sensor nodes communicate in short distances and collaboratively work toward fulfilling the application specific objectives of WSN. However, realization of wide range of envisioned WSN applications necessitates effective communication protocols which can address ...
Wireless sensor networks for security: Issues and challenges
Onel, T; Onur, Ertan; Ersoy, C; Delic, H (2006-01-01)
In this chapter, the sensing coverage area of surveillance wireless sensor networks is considered. The sensing coverage is determined by applying Neyman-Pearson detection and defining the breach probability on a grid-modeled field. Using a graph model for the perimeter, Dijkstra's shortest path algorithm is used to find the weakest breach path. The breach probability is linked to parameters such as the false alarm rate, size of the data record and the signal-to-noise ratio. Consequently, the required number...
Citation Formats
Z. Chu, H. X. Nguyen, T. A. Le, M. Karamanoglu, E. EVER, and A. Yazıcı, “Secure Wireless Powered and Cooperative Jamming D2D Communications,” IEEE Transactions on Green Communications and Networking, pp. 1–13, 2017, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/69619.