Joint resource allocation and secrecy capacity optimization in V2V communications: (Invited paper)

Xuewen Luo, Hsiao Hwa Chen, Weixiao Meng

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Vehicle-to-vehicle (V2V) communication plays an important role in next generation mobile communications, where security is a critical issue. Most previous works relied on encryption/authentication algorithms to ensure V2V communication security. In this paper, we explore physical-layer security in V2V communications. We formulate a secrecy capacity optimization problem, which is solved via decomposing a joint optimization problem into two subproblems, e.g., optimal subcarriers and power allocation problems. Because of the co-channel interferences from different users, the subcarriers allocation subproblem is a three-dimensional (3D) search problem. We develop an iterative algorithm, based on which we transform a non-convex power allocation problem to a convex form before solving it using an alternating maximization (AM) algorithm. Simulations are used to validate the performance of the proposed physical-layer security scheme.

Original languageEnglish
Title of host publication2019 IEEE/CIC International Conference on Communications in China, ICCC 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages30-35
Number of pages6
ISBN (Electronic)9781728107325
DOIs
Publication statusPublished - 2019 Aug
Event2019 IEEE/CIC International Conference on Communications in China, ICCC 2019 - Changchun, China
Duration: 2019 Aug 112019 Aug 13

Publication series

Name2019 IEEE/CIC International Conference on Communications in China, ICCC 2019

Conference

Conference2019 IEEE/CIC International Conference on Communications in China, ICCC 2019
Country/TerritoryChina
CityChangchun
Period19-08-1119-08-13

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Networks and Communications
  • Hardware and Architecture
  • Signal Processing
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Joint resource allocation and secrecy capacity optimization in V2V communications: (Invited paper)'. Together they form a unique fingerprint.

Cite this