Security enhancement in cellular networks employing D2D friendly jammer for V2V communication


Kumar J. S., Gupta A., Tanwar S., Kumar N., Akleylek S.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, vol.26, no.2, pp.865-878, 2023 (SCI-Expanded) identifier identifier

  • Publication Type: Article / Article
  • Volume: 26 Issue: 2
  • Publication Date: 2023
  • Doi Number: 10.1007/s10586-022-03551-0
  • Journal Name: CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
  • Journal Indexes: Science Citation Index Expanded (SCI-EXPANDED), Scopus, Academic Search Premier, PASCAL, Applied Science & Technology Source, Compendex, Computer & Applied Sciences, INSPEC
  • Page Numbers: pp.865-878
  • Keywords: Device-to-device, Communication Architecture, Ergodic Secrecy Capacity, Security and privacy, Vehicle-to-vehicle, TO-DEVICE COMMUNICATION, PHYSICAL-LAYER SECURITY, RESOURCE-MANAGEMENT, ALLOCATION, CHANNEL, 5G
  • Ondokuz Mayıs University Affiliated: Yes

Abstract

In this paper, the security aspects in the vehicle-to-vehicle (V2V) communication with the backbone cellular network is thoroughly investigated with the aid of a device-to-device (D2D) communication link that shares the spectral resources using the base station with multiple-antennas. With assumptions of authorized user's channel state information and by utilizing the maximal ratio transmission at the base station, derivation of ergodic secrecy capacity and ergodic capacity for the wiretap channel and D2D link respectively are derived. Existing works lacks to elaborate the impact of security and power optimization through D2D communications, particularly for V2V applications. This article also exhibits an easy and efficient method of power allocation to enhance the secrecy performance that satisfies the requirements of D2D transmission. Also, the Golden algorithm is derived to optimize the power allocation mechanism. Eventually, numerical results are presented to illustrate the advantages of our investigation by concluding that D2D communication's interference is taken as a friendly jammer to improve transmission security in mobile networks. The results emphasize the support of D2D interference for providing enhanced secrecy capacity for the wireless and wiretap channel with optimized power allocation targeted towards better V2V communication.