Loading…
Optimal D2D power for secure D2D communication with random eavesdropper in 5G‐IoT networks
Summary In the rapidly evolving landscape of fifth generation Internet of Things (5G‐IoT) networks, Device‐to‐Device (D2D) communication has emerged as a promising paradigm to enhance secrecy transmission rate (STR) and connectivity. However, the security of D2D communications in the presence of eav...
Saved in:
Published in: | Concurrency and computation 2024-04, Vol.36 (9), p.n/a |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Summary
In the rapidly evolving landscape of fifth generation Internet of Things (5G‐IoT) networks, Device‐to‐Device (D2D) communication has emerged as a promising paradigm to enhance secrecy transmission rate (STR) and connectivity. However, the security of D2D communications in the presence of eavesdroppers remains a critical challenge. This article investigates the problem of optimizing D2D transmit power to achieve secure D2D communication while considering the presence of random eavesdroppers in 5G‐IoT networks. We propose a novel secrecy‐based power control approach (SRMWPCA) approach to model the random distribution of eavesdroppers in the network, taking into account their varying distances from D2D pairs and deliberately increasing interference at the eavesdropper's link. By leveraging tools from stochastic geometry, we derive an analytical expression for the secrecy transmission probability (STP), which quantifies the probability of eavesdroppers successfully decoding the D2D transmission. In this analysis, we have incorporated practical considerations such as channel fading, path loss, and interference from other devices. To enhance the security of D2D communication, we formulate an optimization problem to determine the optimal transmit power levels for D2D pairs, subject to constraints on the secrecy transmission probability and interference to the cellular network. We propose an efficient algorithm to find the power allocation that maximizes the secrecy outage performance while meeting these constraints. Simulation results demonstrate the effectiveness of the proposed approach in achieving secure D2D communication in 5G‐IoT networks with random eavesdroppers. The performance of the proposed SRMWPCA approach improved by 23.25% and 20.9% compared with standard approaches in terms of the secrecy rate and throughput of the users from malicious attacks. |
---|---|
ISSN: | 1532-0626 1532-0634 |
DOI: | 10.1002/cpe.7993 |