TY - GEN
T1 - Joint resource allocation and secrecy capacity optimization in V2V communications
T2 - 2019 IEEE/CIC International Conference on Communications in China, ICCC 2019
AU - Luo, Xuewen
AU - Chen, Hsiao Hwa
AU - Meng, Weixiao
PY - 2019/8
Y1 - 2019/8
N2 - Vehicle-to-vehicle (V2V) communication plays an important role in next generation mobile communications, where security is a critical issue. Most previous works relied on encryption/authentication algorithms to ensure V2V communication security. In this paper, we explore physical-layer security in V2V communications. We formulate a secrecy capacity optimization problem, which is solved via decomposing a joint optimization problem into two subproblems, e.g., optimal subcarriers and power allocation problems. Because of the co-channel interferences from different users, the subcarriers allocation subproblem is a three-dimensional (3D) search problem. We develop an iterative algorithm, based on which we transform a non-convex power allocation problem to a convex form before solving it using an alternating maximization (AM) algorithm. Simulations are used to validate the performance of the proposed physical-layer security scheme.
AB - Vehicle-to-vehicle (V2V) communication plays an important role in next generation mobile communications, where security is a critical issue. Most previous works relied on encryption/authentication algorithms to ensure V2V communication security. In this paper, we explore physical-layer security in V2V communications. We formulate a secrecy capacity optimization problem, which is solved via decomposing a joint optimization problem into two subproblems, e.g., optimal subcarriers and power allocation problems. Because of the co-channel interferences from different users, the subcarriers allocation subproblem is a three-dimensional (3D) search problem. We develop an iterative algorithm, based on which we transform a non-convex power allocation problem to a convex form before solving it using an alternating maximization (AM) algorithm. Simulations are used to validate the performance of the proposed physical-layer security scheme.
UR - http://www.scopus.com/inward/record.url?scp=85074092254&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85074092254&partnerID=8YFLogxK
U2 - 10.1109/ICCChina.2019.8855862
DO - 10.1109/ICCChina.2019.8855862
M3 - Conference contribution
T3 - 2019 IEEE/CIC International Conference on Communications in China, ICCC 2019
SP - 30
EP - 35
BT - 2019 IEEE/CIC International Conference on Communications in China, ICCC 2019
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 11 August 2019 through 13 August 2019
ER -