Secrecy Rate Maximization via Radio Resource Allocation in Cellular Underlaying V2V Communications

Yiliang Liu, Wei Wang, Hsiao Hwa Chen, Liangmin Wang, Nan Cheng, Weixiao Meng, Xuemin Shen

Research output: Contribution to journalArticlepeer-review

11 Citations (Scopus)


In device-to-device (D2D) underlaying vehicle-to-vehicle (V2V) communications, radio resource blocks (RBs) are allocated to primary cellular users, which yields sub-optimal rates and a long access latency for secondary D2D-enabled vehicles. This work investigates a joint radio resource and power management (RRPM) problem for secure cellular underlaying V2V communications, where cellular users and vehicles have the same priority, giving vehicles more opportunities to access the RBs. Specifically, we aim to maximize secrecy rates of V2V channels under the condition that eavesdropper has an adaptive receiving detection vector to maximize the received signal-to-interference-plus-noise ratio (SINR) from vehicles. For a single pair of a vehicle and a cellular user, the closed-form optimal power allocation expressions are derived for the interference-limited scenario and the noise-limited scenario, respectively. Moreover, for multiple pairs of vehicles and cellular users, a 3-partite hypergraph based 3-dimensional matching approach is proposed to solve a mixed-integer and non-convex problem, which achieves a near-optimal result with an O(n4) time complexity. Simulations in different scenarios show that the secrecy rate of the proposed scheme can be improved by 50% if compared to existing schemes.

Original languageEnglish
Article number9061025
Pages (from-to)7281-7294
Number of pages14
JournalIEEE Transactions on Vehicular Technology
Issue number7
Publication statusPublished - 2020 Jul

All Science Journal Classification (ASJC) codes

  • Automotive Engineering
  • Aerospace Engineering
  • Electrical and Electronic Engineering
  • Applied Mathematics


Dive into the research topics of 'Secrecy Rate Maximization via Radio Resource Allocation in Cellular Underlaying V2V Communications'. Together they form a unique fingerprint.

Cite this