首页|对抗全双工主动窃听的安全高效D2D通信策略

对抗全双工主动窃听的安全高效D2D通信策略

扫码查看
第5代(The Fifth-generation,5G)移动通信网络技术飞速发展,同频双工技术是其中一项关键技术.将这项技术运用到设备到设备(Device to Device,D2D)通信系统中,不仅可以提高资源利用率,还能提高系统通信的安全性.然而,非法用户运用全双工技术将对系统的安全性产生巨大的威胁.因此,针对D2D通信系统中存在全双工主动窃听者恶意干扰D2D用户的问题,主要研究基于Stackelberg博弈的对抗全双工恶意窃听者的安全高效功率分配方案.由于合法用户和主动窃听者的行为相互影响、相互干扰,在保证保密速率要求的情况下,分别考虑单链路与多链路的场景,研究以最小化D2D用户消耗功率和最大化窃听效用为目标的最佳功率分配策略.由于D2D用户和恶意窃听者的优化问题不能分开解决,通过将它们之间的交互构建成Stackelberg博弈模型,并基于二分法算法和模拟退火算法进行求解.仿真表明,通过合理的功率分配能够有效对抗全双工恶意窃听者的窃听和干扰,从而实现安全高效通信,满足更高的系统安全性需求.
Secure and Efficient D2D Communication Strategy Against Full-duplex Active Eavesdropping
The Fifth-generation(5G)mobile communication network technology is developing rapidly,and the same frequency duplex technology is one of the key technologies.The application of this technology to Device-to-Device(D2D)communication system can not only improve the utilization rate of resources,but also improve the security of system communication.However,the use of full duplex technology by illegal users will pose a huge threat to the security of the system.Therefore,to solve the problem of malicious jamming of D2D users by active full-duplex eavesdroppers in D2D communication systems,a secure and efficient power allocation scheme against malicious full-duplex eavesdroppers based on Stackelberg game is mainly studied.Since the behaviors of legitimate users and active eavesdropper interact and interfere with each other,the scenarios of single link and multi-link respectively are considered,and the optimal power allocation strategy aiming at minimizing the power consumption of D2D users and maximizing the utility of eavesdropping under the condition of ensuring the confidentiality rate is studied.Since the optimization problem of D2D users and malicious eavesdroppers cannot be solved separately,the Stackelberg game model is constructed by the interaction between them,and the solution is based on the dichotomy algorithm and simulated annealing algorithm.Simulation results show that reasonable power allocation can effectively counter the interception and jamming of full-duplex malicious eavesdroppers,so as to achieve secure and efficient communication and meet higher system security requirements.

physical layer securityD2Dfull-duplex

胡阳、杨爽、张明、韦存、王磊、江雪

展开 >

国网电力科学研究院有限公司,江苏南京 210003

南京南瑞信息通信科技有限公司,江苏南京 210003

南京邮电大学通信与信息工程学院,江苏南京 210003

南京邮电大学物联网学院,江苏南京 210003

展开 >

物理层安全 设备到设备 全双工

国家电网总部管理科技项目国家自然科学基金

5108-202218280A-2-199-XG62071255

2024

无线电工程
中国电子科技集团公司第五十四研究所

无线电工程

影响因子:0.667
ISSN:1003-3106
年,卷(期):2024.54(5)
  • 18