How Much Can Radio Resource Allocation Help to Improve Secrecy Capacity of V2V Underlay Cellular Networks?

Xuewen Luo, Hsiao Hwa Chen, Weixiao Meng

Research output: Contribution to journalArticlepeer-review

5 Citations (Scopus)

Abstract

Vehicle-to-vehicle (V2V) underlay cellular communication plays an important role in the fifth-generation (5G) and beyond communications and its security issues attract a lot of attention. Physical layer security, which explores channel characteristics to protect wireless communications, is very attractive due to its low latency. This paper focuses on secrecy capacity maximization in V2V underlay cellular communications, where the secrecy capacity of vehicular user equipments (VUEs) is optimized first, followed by sum proportional fairness function optimization for both VUEs and cellular user equipments (CUEs). The optimization problems can be solved in two sub-problems, e.g., power and subcarrier allocation problems. The power allocation can be done with the first strategy using a one-dimensional searching algorithm, whereas a genetic algorithm (GA) is used to solve the second optimization problem. In addition, as VUEs share uplink resources with CUEs, the co-channel interference exists and the subcarrier allocation sub-problem is a 3D search problem, which is solved by a two-step iterative Hungarian algorithm (IHA). Finally, simulations are performed to validate the performance of the proposed schemes.

Original languageEnglish
Article number9222106
Pages (from-to)14932-14944
Number of pages13
JournalIEEE Transactions on Vehicular Technology
Volume69
Issue number12
DOIs
Publication statusPublished - 2020 Dec

All Science Journal Classification (ASJC) codes

  • Aerospace Engineering
  • Electrical and Electronic Engineering
  • Computer Networks and Communications
  • Automotive Engineering

Fingerprint

Dive into the research topics of 'How Much Can Radio Resource Allocation Help to Improve Secrecy Capacity of V2V Underlay Cellular Networks?'. Together they form a unique fingerprint.

Cite this