TY - JOUR
T1 - The full-duplex device-to-device security communication under the coverage of unmanned aerial vehicle
AU - Zeng, Qian
AU - Zhang, Zhongshan
N1 - Publisher Copyright:
© 2019 KSII.
PY - 2019/4/30
Y1 - 2019/4/30
N2 - Unmanned aerial vehicles (UAVs), acting as mobile base stations (BSs), can be deployed in the typical fifth-generation mobile communications (5G) scenarios for the purpose of substantially enhancing the radio coverage. Meanwhile, UAV aided underlay device-to-device (D2D) communication mode can be activated for further improving the capacity of the 5G networks. However, this UAV aided D2D communication system is more vulnerable to eavesdropping attacks, resulting in security risks. In this paper, the D2D receivers work in full-duplex (FD) mode, which improves the security of the network by enabling these legitimate users to receive their useful information and transmit jamming signal to the eavesdropper simultaneously (with the same frequency band). The security communication under the UAV coverage is evaluated, showing that the system’s (security) capacity can be substantially improved by taking advantage of the flexible radio coverage of UAVs. Furthermore, the closed-form expressions for the coverage probabilities are derived, showing that the cellular users (CUs)’ secure coverage probability in downlink transmission is mainly impacted by the following three factors: Its communication area, the relative position with UAV, and its eavesdroppers. In addition, it is observed that the D2D users or DUs’ secure coverage probability is relevant to state of the UAV. The system’s secure capacity can be substantially improved by adaptively changing the UAV’s position as well as coverage.
AB - Unmanned aerial vehicles (UAVs), acting as mobile base stations (BSs), can be deployed in the typical fifth-generation mobile communications (5G) scenarios for the purpose of substantially enhancing the radio coverage. Meanwhile, UAV aided underlay device-to-device (D2D) communication mode can be activated for further improving the capacity of the 5G networks. However, this UAV aided D2D communication system is more vulnerable to eavesdropping attacks, resulting in security risks. In this paper, the D2D receivers work in full-duplex (FD) mode, which improves the security of the network by enabling these legitimate users to receive their useful information and transmit jamming signal to the eavesdropper simultaneously (with the same frequency band). The security communication under the UAV coverage is evaluated, showing that the system’s (security) capacity can be substantially improved by taking advantage of the flexible radio coverage of UAVs. Furthermore, the closed-form expressions for the coverage probabilities are derived, showing that the cellular users (CUs)’ secure coverage probability in downlink transmission is mainly impacted by the following three factors: Its communication area, the relative position with UAV, and its eavesdroppers. In addition, it is observed that the D2D users or DUs’ secure coverage probability is relevant to state of the UAV. The system’s secure capacity can be substantially improved by adaptively changing the UAV’s position as well as coverage.
KW - Coverage probability
KW - Device-to-device communication
KW - Full-duplex
KW - Security communication
KW - Unmanned aerial vehicle
UR - http://www.scopus.com/inward/record.url?scp=85068431289&partnerID=8YFLogxK
U2 - 10.3837/tiis.2019.04.011
DO - 10.3837/tiis.2019.04.011
M3 - Article
AN - SCOPUS:85068431289
SN - 1976-7277
VL - 13
SP - 1941
EP - 1960
JO - KSII Transactions on Internet and Information Systems
JF - KSII Transactions on Internet and Information Systems
IS - 4
ER -