Advanced
Joint Spectrum and Power Allocation for Green D2D Communication with Physical Layer Security Consideration
Joint Spectrum and Power Allocation for Green D2D Communication with Physical Layer Security Consideration
KSII Transactions on Internet and Information Systems (TIIS). 2015. Mar, 9(3): 1057-1073
Copyright © 2015, Korean Society For Internet Information
  • Received : August 11, 2014
  • Accepted : February 27, 2015
  • Published : March 31, 2015
Download
PDF
e-PUB
PubReader
PPT
Export by style
Share
Article
Author
Metrics
Cited by
TagCloud
About the Authors
Hualiang Chen
College of Communications Engineering, PLA University of Science and Technology, No.2 Biaoying, Yudao Street, 210007, Nanjing – China
Yueming Cai
College of Communications Engineering, PLA University of Science and Technology, No.2 Biaoying, Yudao Street, 210007, Nanjing – China
Dan Wu
College of Communications Engineering, PLA University of Science and Technology, No.2 Biaoying, Yudao Street, 210007, Nanjing – China

Abstract
In this paper, we consider cooperative D2D communications in cellular networks. More precisely, a cellular user leases part of its spectrum to facilitate the D2D communication with a goal of improving the energy efficiency of a D2D pair. However the D2D pair is untrusted to the cellular user, such resource sharing may result in the information of this cellular user unsecured. In order to motivate the cellular user’s generosity, this D2D pair needs to help the cellular user maintain a target secrecy rate. To address this issue, we formulate a joint spectrum and power allocation problem to maximize the energy efficiency of the D2D communication while guaranteeing the physical layer security of the cellular user. Then, a theorem is proved to indicate the best resource allocation strategy, and accordingly, an algorithm is proposed to find the best solution to this resource allocation problem. Numerical results are finally presented to verify the validity and effectiveness of the proposed algorithm.
Keywords
1. Introduction
W ith the explosive growth of wireless traffic and service variety, wireless users increasingly need higher data rates, lower energy consumption and higher level of security. However, the limited spectrum and energy resources may well hinder to fulfill such needs.
Firstly, nowadays wireless users require much higher data rate to support various impending service requirement, such as video conversation, multimedia sharing and so on. On the other hand, to obtain high data rate using more spectrum resource is becoming more and more impractical. The wireless spectrum proper for cellular communications is becoming denser and denser due to the explosively growing wireless service subscribers and techniques. Secondly, battery powered wireless users are more sensitive to energy consumption, all the more so when the current wireless services is much easier to consume more energy compared to the traditional voice calls. As such, to effectively use the precious spectrum and energy resources is becoming more and more pressing. Researchers are racking their brains to think how to confront these challenges.
Among the numerous solutions, Device-to-Device (D2D) communications have drawn much attention from both academia and industry in the last few years [1 - 4] . D2D communication sanctions two cellular users in proximity the viable access of licensed cellular spectrum under the control of the cellular network infrastructure. Then, the two cellular users can directly transmit data while bypassing the base station (BS). Consequently, the network traffic can be offloaded. Besides, D2D communication may bring high data rate and low energy consumption due to the proximity between the wireless users. And the resource utilization efficiency may be boosted due to the possible resource reuse between the D2D communications and the traditional cellular communications.
Meanwhile, due to the openness of nowadays wireless systems, the security of wireless users’ confidential information has been receiving much attention. Security problem becomes much more severe especially when spectrum sharing is permitted. From the perspective of the physical layer security for a D2D communication system, there may exist an eavesdropper who is trying to wiretap the confidential data information of cellular users via the D2D pairs. Fortunately, D2D communication may help to guarantee the transmission of the confidential data, and then the level of the security for the cellular user may be improved. In this context, effective resource allocation becomes vital to realize the benefits of D2D communications while insuring the secure of cellular communications.
Resource allocation problem in D2D communications has been widely discussed in related work [5 - 10] . The authors of Ref. [5] and Ref. [6] investigate the coalition formation based energy efficiency enhancement scheme in multiple-user D2D systems. Ref. [7] proposes a distributed power allocation algorithm to enhance the energy efficiencies of both cellular users and D2D pairs based on non-cooperative game, besides the authors also investigate the tradeoff between energy efficiency and spectrum efficiency. All these work does not consider the problem of security, which is necessitate to be discussed when spectrum sharing is sanctioned. Furthermore, they do not consider the possible cooperation between cellular communication and D2D communication.
Ref. [8] introduces D2D communication to the problem of secrecy capacity. It maximizes the achievable data rate of D2D communication through deriving the optimal transmission power and access control of D2D communication, while keeping the secrecy outage probability under a certain threshold. In order to enhance the sum secrecy rate of multiple cellular users, the authors of [9] utilize Stackelberg game to allocate the transmit power of a D2D pair on the multiple cellular channels. A matching problem of the radio resource allocation for physical layer security in D2D underlay communications is formulated in [10] by using a Kuhn-Munkres algorithm. The above studies consider the impact on system secrecy capacity with D2D communication reusing the cellular spectrum. They all assume there exists single or multiple malicious wiretapping nodes and neglect the odds of eavesdropping between wireless entities who share the same spectrum.
On the other hand, secure communications in cooperative systems are investigated in [11 - 15] . Still in [11] and [12] , special eavesdropper is assumed. The relays are all deployed as friendly jammers or beamformers, completely helping to enhance the secrecy rate of the communication. Differently, untrusted relays are investigated in [13 - 15] , which may act as an eavesdropper itself or be wiretapped by a malicious eavesdropper. Due to the openness of modern wireless communication systems and the thriving of the concept of user cooperation, it is of much value to investigate the untrusted relays. However, most of the works seldom consider the cooperation among different coequal users, who have their respective communication requirements. What is more, the energy efficient resource allocation analysis under secrecy constraints is lacking.
In this paper, joint spectrum and power allocation scheme for energy efficient cooperative D2D communication is considered. The spectrum of cellular communications is reused by D2D communications due to the spectrum scarcity. Because of the spectrum reuse, cellular user’s confidential message is threatened to be wiretapped through or by the corresponding D2D user. This secure problem is considered from a physical layer security perspective. And the D2D user is asked to relay the cellular user’s message in order to guarantee a target secrecy rate. The objective of this paper is to determine a joint spectrum and power allocation scheme which can induce the best energy efficiency for the D2D pair, while guaranteeing the cellular user a target secrecy rate. We propose a theorem to show where the optimal resource allocation scheme maximizing the energy efficiency of the D2D pair lies. According to this theorem, an algorithm of low complexity to determine the best joint resource allocation scheme is designed.
The remainder of this paper is outlined as follows. Section 2 gives the discussed system model and describes the optimization problem. After that, we propose a theorem and an algorithm to determine the optimal resource allocation scheme in Section 3. In Section 4, numerical results and discussions are provided to verify the theorem and the algorithm. A conclusion of this paper is given in Section 5.
2. System Model and Problem Description
In this paper, a cooperative system consisting of a cellular user and a D2D pair is investigated as shown in Fig. 1 . Here, we refer to two cellular users that can communicate with each other under the coordination by the network infrastructure as a D2D pair. The uplink cellular user Alice transmits confidential message to the base station (BS), while the D2D pair comprising Rice and Steve wants to reuse Alice’s spectrum to communicate due to the spectrum scarcity in the cell.
PPT Slide
Lager Image
System model
A target secrecy rate of Alice must be firstly satisfied. After that, Alice is willing to cooperatively share his spectrum resource with Rice to help Rice to obtain high energy efficiency. On the other hand, Rice is asked to act as an amplify-and-forward (AF) relay for Alice to fulfill the secrecy rate requirement. Based on this configuration, Rice uses the spectrum of Alice to communicate with Steve through a device-to-device communication manner. Rice is assumed to be an untrusted relay to Alice, which means the confidential message of Alice is threatened to be eavesdropped through or by Rice.
Rice and Alice use Alice’s spectrum resource through a temporally orthogonal manner. Assume that the holistic time duration is divided into two stages, i.e., the helping stage which persists for α and the self-transmitting stage with a duration of 1 - α ( 0 < α < 1). The transmit power level of Alice is p 0 . And Rice’s transmit power levels are p 1 and p 2 in the helping stage and in the self-transmitting stage, respectively. We further assume that p 1 p max and p 2 p max , where p max is the maximum transmit power of Rice. Denote the channel coefficient from terminal i to terminal j as hij , and then the corresponding channel gain can be written as gij = | hij | 2 , where i ∈ {A, R} , j ∈ {R, B, S} (A is short for Alice, R for Rice, B for BS, and S for Steve). gij is in direct proportion to
PPT Slide
Lager Image
, where dij is the distance between i and j , and n is the path loss factor.
Base on amplify-and-forward (AF) cooperation mode, the achievable data rates of Rice (which is equivalent to the eavesdropping rate), the cellular communication and Steve are respectively
PPT Slide
Lager Image
PPT Slide
Lager Image
PPT Slide
Lager Image
where
PPT Slide
Lager Image
is the received signal-to-noise ratio at Rice,
PPT Slide
Lager Image
are those at BS and Steve in the two stages, respectively. And σ 2 is the variance of the thermal noise.
As a result, the achievable secrecy rate of Alice is given by
PPT Slide
Lager Image
In this paper, we consider the practical case in which the system can be designed so that the secrecy rate is positive. Hence, the achievable secrecy rate can be rewritten as
PPT Slide
Lager Image
Fig. 2 depicts r sec = r sec ( α , p 1 ) in under a certain system setting with SNR B > SNR R . r sec is monotonically increasing with respect to either p 1 or α , which tallies with the first derivatives of r sec to p 1 and α : Eq. (6) and Eq. (7). When a target secrecy rate
PPT Slide
Lager Image
is set, it will induce a region of α and p 1 :
PPT Slide
Lager Image
, which is the feasible region of p 1 and α for the given target secrecy rate.
PPT Slide
Lager Image
PPT Slide
Lager Image
PPT Slide
Lager Image
The achievable secrecy rate rsec with respect to p1 and α.
This paper tries to maximize the energy efficiency of the D2D pair Rice and Steve with the fulfillment of a target secrecy rate
PPT Slide
Lager Image
of Alice. Different from [16] , wherein the authors investigate the energy optimization problem for wireless access networks as a whole, we focus on the energy consumption of individual wireless devices in this paper. And both the transmit power consumption and circuit power consumption are considered. The Rice’s energy consumptions during the helping and self-transmitting stages are h = α ( p cr + p 1 + p ct ) and s = (1 - α )( p 2 + p ct + p cr ) , respectively. Hence, the energy efficiency of the D2D pair can be given by
PPT Slide
Lager Image
where p C = p ct + p cr , p ct and p cr are the consumed power levels at the transmitter and the receiver, respectively.
Therefore, the optimization problem can be formulated as
PPT Slide
Lager Image
PPT Slide
Lager Image
We only discuss the scenario that
PPT Slide
Lager Image
holds.
Note that, the incentive mechanism for the cellular user is not considered in this paper. What is more, we only investigate a simple system with one cellular user and one D2D pair. When considering these two aspects, the joint resource allocation problem becomes a multi-objective problem. As such, game theory could be adapted to address this problem [5 - 6] ; however, this is beyond the scope of our paper.
3. The Optimal Time and Power Allocation
In this section, we firstly propose a theorem to discuss the joint time and power allocation problem. After that, we propose an iterative algorithm to find the optimal solution resulting in the optimal energy efficiency of the D2D communication.
Theorem 1: The optimal energy efficiency of the D2D link ξ opt can only be obtained when the equality in the first condition of Eq. (12) holds.
Proof: Given a target secrecy rate
PPT Slide
Lager Image
, according to Fig. 2 , the contour line
PPT Slide
Lager Image
represents a curve of the two dimension variable ( α , p 1 ) . Suppose that the joint optimal time division and power allocation strategy
PPT Slide
Lager Image
maximizing the energy efficiency of the D2D link is not on the line
PPT Slide
Lager Image
.
According to Fig. 2 , there exist two points
PPT Slide
Lager Image
, which are on the line with
PPT Slide
Lager Image
. Given
PPT Slide
Lager Image
, the optimal transmit power levels from Rice to Steve are assumed to be
PPT Slide
Lager Image
, respectively. Set
PPT Slide
Lager Image
We have,
PPT Slide
Lager Image
Denote
PPT Slide
Lager Image
, and then, the solution set of (12) contains the zero points of the following term
PPT Slide
Lager Image
Since Δ(0) = f ( α , p 1 ) > 0 ,
PPT Slide
Lager Image
, there exists only one zero point of Δ( p 2 ) , which can be denoted as
PPT Slide
Lager Image
. When
PPT Slide
Lager Image
holds, otherwise
PPT Slide
Lager Image
holds. Consequently, the optimal transmit power levels that maximize the energy efficiency of the D2D link given
PPT Slide
Lager Image
can be obtained by
PPT Slide
Lager Image
PPT Slide
Lager Image
PPT Slide
Lager Image
When the optimal transmit power equals to p max , the optimal energy efficiency of the D2D communication is
PPT Slide
Lager Image
While if the optimal power equals to
PPT Slide
Lager Image
, the optimal energy efficiency yields,
PPT Slide
Lager Image
Since we have
PPT Slide
Lager Image
and
PPT Slide
Lager Image
hold. Without loss of generality, let us compare the resultant energy efficiencies obtained by
PPT Slide
Lager Image
. Firstly, if
PPT Slide
Lager Image
, then the energy efficiencies corresponding to is
PPT Slide
Lager Image
are respectively
PPT Slide
Lager Image
. Secondly, if
PPT Slide
Lager Image
are respectively
PPT Slide
Lager Image
and
PPT Slide
Lager Image
. Lastly, if
PPT Slide
Lager Image
, then the energy efficiencies corresponding to
PPT Slide
Lager Image
are
PPT Slide
Lager Image
, consequently,
PPT Slide
Lager Image
.
To sum up, we will always have
PPT Slide
Lager Image
. Following the same steps, we can also prove that
PPT Slide
Lager Image
. These results all contradicts with the optimality of the point
PPT Slide
Lager Image
. In other words,
PPT Slide
Lager Image
cannot be the optimal point if it is not on line
PPT Slide
Lager Image
. The Theorem is proven. ■
Based on the theorem, we give the following algorithm to find the optimal joint spectrum and power allocation scheme in Table 1 .
Algorithm to the optimal resource allocation
PPT Slide
Lager Image
Algorithm to the optimal resource allocation
Firstly, given a target secrecy rate
PPT Slide
Lager Image
, for some pair of ( α , p 1 ) , the proposed algorithm utilizes Newton method to find out the optimal transmit power p 2 in the self-transmitting stage based on Eq. (14). Secondly, by a density of N , we search on the line
PPT Slide
Lager Image
to find the optimal pair of
PPT Slide
Lager Image
and then the joint resource allocation scheme
PPT Slide
Lager Image
which maximizes the energy efficiency of the D2D link.
4. Numeric Results and Discussion
In this section, we present some numerical results to evaluate the theorem and the algorithm. During our simulation, we assume the normalized transmit power of Alice is p 0 = 2 W, the maximal normalized transmit power of Rice is p max = 2 W, and the normalized variance of the thermal noise is σ 2 = 1. As to the circuit power consumption, we assume p ct = p cr = 0.2W. The path loss factor is assumed to be n = 3. The values of these simulation parameters are mainly inspired by [15] .
Fig. 3 depicts the optimal self-transmitting power
PPT Slide
Lager Image
of Rice corresponding to the helping transmit power p 1 and the time division factor α . The target secrecy rate is
PPT Slide
Lager Image
= 0.1bps/Hz.
PPT Slide
Lager Image
is set to be zero and coloured in blue for those ( α , p 1 ) that can not guarantee
PPT Slide
Lager Image
. This figure verifies some results in the proposed theorem. As discussed in the theorem, when ( α , p 1 ) satisfies Δ( p max ) ≥ 0 (Δ(·) is given by Eq. (13)), the energy efficiency monotonously increases with the self-transmitting power, and as a result,
PPT Slide
Lager Image
is the desired solution optimizing the energy efficiency of the D2D pair. While if Δ( p max ) < 0 , the optimal self-transmitting power
PPT Slide
Lager Image
can be derived by Δ( p 2 ) = 0 , which is denoted as
PPT Slide
Lager Image
. Besides, when
PPT Slide
Lager Image
, the optimalself-transmitting power increases with both α and p 1 , which can be also identified in the theorem.
PPT Slide
Lager Image
The optimal self-transmitting power versus (α, p1)
Fig. 4 gives the optimal energy efficiency ξ opt of the D2D link with respect to p 1 and α , where the target secrecy rate is also set to
PPT Slide
Lager Image
= 0.1bps/Hz . The optimal selt-transmitting power
PPT Slide
Lager Image
is firstly obtained according to Fig. 3 . Then ξ opt is determined by Eq. (8). It indicates that ξ opt is monotonously decreases with both α and p 1 . According to the Theorem, the resource allocation scheme inducing the optimal energy efficiency lies on the black line r sec ( α and p 1 ) =
PPT Slide
Lager Image
= 0.1bps/Hz . Our proposed algorithm is to search on this line for the global optimal energy efficiency.
PPT Slide
Lager Image
The optimal energy efficiency of the D2D link versus (α, p1)
Fig. 5 compares the energy efficiencies obtained by the proposed algorithm and the maximal transmit power scheme given p 1 = 1.5W and
PPT Slide
Lager Image
= 0.1bps/Hz. It also shows the optimal self-transmitting power
PPT Slide
Lager Image
by the blue dashed line. From r sec ( α min , p 1 ) =
PPT Slide
Lager Image
, we can obtain the minimal α min ≈ 0.35. The required secrecy rate for the cellular user can be guaranteed only when α α min . The optimal self-transmitting power rises to
PPT Slide
Lager Image
= p max when α = 0.77 , and ( α , p 1 ) = (0.77, 1.5) lies on the line
PPT Slide
Lager Image
= p max shown in Fig. 3 . When α min α ≤ 0.77 , Δ( p max ) ≤ 0 and
PPT Slide
Lager Image
is the solution of Δ( p 2 ) = 0 , which increases with α . Once α ≥ 0.77 , we have Δ( p max ) ≥ 0 and
PPT Slide
Lager Image
= p max . On the other hand, the energy efficiency with maximal p 1 = p max and p 2 = p max is also depicted by the black dotted line in this figure. Obviously, the proposed algorithm can yield higher energy efficiency compared to the scheme with the maximal transmit power. In addition, ξ opt is monotonously decreasing versus α , which is consistent with the results in Eq. (18), Eq. (19), Fig. 3 and Fig. 4 .
PPT Slide
Lager Image
The optimal self-transmitting power and energy efficiency versus α
Fig. 6 compares the energy efficiencies obtained by the proposed algorithm and the maximal transmit power scheme given α = 0.75 and
PPT Slide
Lager Image
= 0.1bps/Hz. It also depicts the optimal self-transmitting power
PPT Slide
Lager Image
with respect to helping power p 1 . From r sec ( α , p 1min ) =
PPT Slide
Lager Image
, the minimal helping transmit power is p 1min = 0.51 (W). Only when p 1 p 1min , can the secrecy rate requirement of the cellular user be satisfied. The optimal self-transmitting power rises to
PPT Slide
Lager Image
= p max when p = 1.7 , and ( α , p 1 ) = (0.75, 1.7) lies on the line
PPT Slide
Lager Image
= p max shown in Fig. 3 . When p 1min p 1 ≤ 1.7 , Δ( p max ) ≤ 0 and
PPT Slide
Lager Image
equals to
PPT Slide
Lager Image
, which increases with p 1 . Once p 1 ≥ 1.7 , we have
PPT Slide
Lager Image
= p max . In addition, we also focus on the energy efficiency with maximal p 2 . The proposed algorithm obtains higher energy efficiency compared to the scheme with the maximal p 2 . ξ opt decreases with p 1 , which is consistent with Eq. (18), Eq. (19), Fig. 3 and Fig. 4 .
PPT Slide
Lager Image
The optimal self-transmitting power and energy efficiency versus p1
Fig. 7 shows the optimal joint resource allocatioin scheme
PPT Slide
Lager Image
for defferent target secracy rate
PPT Slide
Lager Image
. As proved by the theorem, the optimal resource allocation scheme is found on the curve r sec ( α , p 1 ) =
PPT Slide
Lager Image
. This figure indicates that
PPT Slide
Lager Image
rise to be p max successively when
PPT Slide
Lager Image
= 0.12 bps/Hz and 0.25 bps Hz , respectively. The optimal helping power rises to be p max in order to guarantee the increasing target secrecy rate for the cellular user. When
PPT Slide
Lager Image
rises to be 0.25 bps Hz ,
PPT Slide
Lager Image
increase to such an extent that Δ( p max ) becomes non-negative, and hence the optimal self-transmitting power becomes
PPT Slide
Lager Image
= p max . The optimal
PPT Slide
Lager Image
linearly increases with
PPT Slide
Lager Image
when
PPT Slide
Lager Image
≥ 012. This is because
PPT Slide
Lager Image
= p max satisfy
PPT Slide
Lager Image
.
PPT Slide
Lager Image
The optimal α, p1 and p2 versus
Fig. 8 shows the energy efficiency for different target secrecy rate
PPT Slide
Lager Image
. Compared to the scheme with maximal p 1 and p 2 , the proposed algorithm obtains better energy efficiency for the D2D link. The smaller
PPT Slide
Lager Image
is, the more the proposed algorithm has the advantage. In small
PPT Slide
Lager Image
region, given p 1 = p max , the optimal self-transmitting power
PPT Slide
Lager Image
is much smaller than p max according to Fig. 3 . In large
PPT Slide
Lager Image
region, according to Fig. 7 ,
PPT Slide
Lager Image
equal to p max . As a result, the proposed algorithm can obtain a better energy efficiency performance for small
PPT Slide
Lager Image
, and obtain equivalent energy efficiency to the scheme with maximal p 1 and p 2 for large
PPT Slide
Lager Image
.
PPT Slide
Lager Image
The optimal ξ versus
5. Conclusion
In this paper, we analyze the energy efficiency of cooperative D2D communications in cellular networks. The spectrum and power resources are jointly allocated to obtain the best energy efficiency for the D2D pair and guarantee the cellular user a target secrecy data rate. Based on the theoretical analysis, we propose a low complex algorithm to induce the best resource allocation scheme. Extensive numerical experiments are presented to verify the propose algorithm. The results show that our proposed algorithm can dramatically improve the energy efficiency of the D2D pair compared with the maximal transmit power scheme.
The results in this paper can provide fundamental insights. Based on the results of this paper, the extension to the system with multiple cellular users and multiple D2D pairs can be considered. We would like to deal with this problem in future.
BIO
Hualiang Chen received the B. S. degree in Electronic and Information Engineering from Ocean University of China, Qingdao, China in 2009, the M. S. degree in Communications and Information Systems from PLA University of Science and Technology, Nanjing, China in 2012. He is currently pursuing for the Ph. D. degree in Information and Communications Engineering at PLA University of Science and Technology. His research interest includes cooperative communications, game theory, green communications, and physical layer security.
Yueming Cai received the B. S. degree in Physics from Xiamen University, Xiamen, China in 1982, the M. S. degree in Micro-electronics Engineering and the Ph. D. degree in Communications and Information Systems both from Southeast University, Nanjing, China in 1988 and 1996, respectively. He is now one of the chief experts of PLA University of Science and Technology, Nanjing, China. His current research interest includes signal processing in communications, cooperative communications, wireless sensor networks and physical layer security.
Dan Wu received the B. S., M. S. and Ph. D. degrees all from College of Communications Engineering, PLA University of Science and Technology, Nanjing, China in 2006, 2009 and 2012, respectively. She is currently working as a post-doctor in College of Communications Engineering, PLA University of Science and Technology, Nanjing, China. Her research interests are mainly on resource allocation and management, game theory, cooperative communications and wireless sensor networks.
References
Doppler K. , Rinne M. , Wijting C. , Ribeiro C. B. , Hugl K. 2009 “Device-to-Device Communication as an Underlay to LTE-Advanced Networks,” IEEE Communications Magazine 47 (12) 42 - 49    DOI : 10.1109/MCOM.2009.5350367
Fodor G. , Dahlman E. , Mildh G. , Parkvall S. , Reider N. , Miklós G. , Turányi Z. 2012 “Design Aspects of Network Assisted Device-to-Device Communications,” IEEE Communication Magazine 50 (3) 170 - 177    DOI : 10.1109/MCOM.2012.6163598
Lin X. , Andrews J. G. , Ghosh A. , Ratasuk R. 2014 “An Overview of 3GPP Dievice-to-Device Proximity Services,” IEEE Communications Magazine 52 (4) 40 - 48    DOI : 10.1109/MCOM.2014.6807945
Asadi A. , Wang Q. , Mancuso V. 2014 “A Survey on Device-to-Device Communication in Cellular Networks,” IEEE Transactions on Communications Surveys and Tutorials 99 1 - 19
Wu D. , Wang J. , Hu R. Q. , Cai Y. , Zhou L. 2014 “Energy-Efficient Resource Sharing for Mobile Device-to-Device Multimedia Communications,” IEEE Transactions on Vehicular Technology 63 (5) 2093 - 2103    DOI : 10.1109/TVT.2014.2311580
Chen H. , Wu D. , Cai Y. 2014 “Coalition Formation Game for Green Resource Management in D2D Communications,” IEEE Communications Letters 18 (8) 1395 - 1398    DOI : 10.1109/LCOMM.2014.2326852
Zhou Z. , Dong M. , Ota K. , Wu J. , Sato T. 2014 “Energy Efficiency and Spectral Efficiency Tradeoff in Device-to-Device (D2D) Communications,” IEEE Wireless Communications Letters 3 (5) 485 - 488    DOI : 10.1109/LWC.2014.2337295
Yue J. , Ma C. , Yu H. , Zhou W. 2013 “Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks,” IEEE Communications Letters 17 (11) 2068 - 2071    DOI : 10.1109/LCOMM.2013.092813.131367
Qu J. , Cai Y. , Wu D. , Chen H. 2014 “Stackelberg Game Based Power Allocation for Physical Layer Security of Device- to-Device Communication Underlaying Cellular Networks,” Frequenz 68 (5-6) 285 - 295    DOI : 10.1515/freq-2013-0147
Zhang H. , Wang T. , Song L. , Han Z. “Radio Resource Allocation for Physical-Layer Security in D2D Underlay Communications,” in Proc. of IEEE ICC 2014 2325 - 2330
Guan X. , Cai Y. , Yang W. 2014 “On the Reliability-Security Tradeoff and Secrecy Throughput in Cooperative ARQ,” IEEE Communications Letters 18 (3) 479 - 482    DOI : 10.1109/LCOMM.2014.012714.132836
Guan X. , Cai Y. , Yang W. , Cheng Y. , Hu J. 2012 “Increasing Secrecy Capacity via Joint Design of Cooperative Beamforming and Jamming,” KSII Transactions on Internet and Information Systems 6 (4) 1041 - 1062
He X. , Yener A. “The Role of an Untrusted Relay in Secret Communication,” in Proc. of ISIT 2008 2212 - 2216
Milosavljevic N. , Gastpar M. , Ramchandran K. “Secure Communication using an Untrusted Relay via Sources and Channels,” in Proc. of ISIT 2009 2457 - 2461
Zhang R. , Song L. , Han Z. , Jiao B. 2012 “Physical Layer Security for Two-Way Untrusted Relaying with Friendly Jammers,” IEEE Transactions on Vehicular Technology 61 (8) 3693 - 3704    DOI : 10.1109/TVT.2012.2209692
Lorincz J. , Capone A. , Begusic D. 2011 “Heuristic Algorithms for Optimization of Energy Consumption in Wireless Access Networks” KSII Transactions on Internet and Information Systems 5 (5) 514 - 540