SGR-MOP Based Secrecy-Enabled Resource Allocation Scheme for 5G Networks

The radio-cast nature of wireless communications is always exposed to the eavesdropping attack. To safeguard 5 G communications where both the CUs and Device to Device (D2D) users can communicate securely becomes a prime objection. To examine this issue we have investigated the eavesdropping attack...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of network and systems management 2023-07, Vol.31 (3), p.60, Article 60
Hauptverfasser: Dubey, Rishav, Mishra, Pavan Kumar, Pandey, Sudhakar
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The radio-cast nature of wireless communications is always exposed to the eavesdropping attack. To safeguard 5 G communications where both the CUs and Device to Device (D2D) users can communicate securely becomes a prime objection. To examine this issue we have investigated the eavesdropping attack in a considered 5 G Networks, and analysed the secrecy rate (SR), and data rate of the D2D communication enabled 5 G networks. Different from previous work mentioned in literature we have proposed a joint resource allocation and power allocation scheme with the constraint of unknown channel state information (CSI) of the presented eavesdropper (EDs) in a cell. We have proposed a Stackelberg game-based resource allocation scheme and a state of the art monarch butterflies optimization (MBO) based power allocation (SGR-MOP) scheme to enhance the SR of the CUs along with enhance the data rate of the cell as well. The proposed scheme is further subdivided into two sub-schemes where the resource allocation scheme is designed to form a group of CUs and D2D users to enhance the SR of the CUs. Moreover, the proposed power allocation scheme is designed to enhance the data rate of D2D users. We consider a scenario where the eNodeB (eNB) has all the channel state information (CSI) of the CUs and D2D users however, the presence of the eavesdropper is not known to the eNB. We have compared our proposed scheme with the existing related schemes mentioned in the literature. The simulation results display that our scheme outperforms compared with other related schemes.
ISSN:1064-7570
1573-7705
DOI:10.1007/s10922-023-09750-3