Security and Reliability Trade-off in Device to Device Communications with Untrusted Relays

Document Type : Research Article


1 Faculty of Electrical, Biomedical and Mechatronics Engineering, Qazvin Branch, Islamic Azad University, Qazvin, Iran

2 Communications Group, EE Department Amirkabir University

3 Qazvin Islamic Azad University


In this paper, we investigate the trade-off between reliability and security in a device to device (D2D) network including a pair of D2D, an untrusted relay, and a jammer. The untrusted relay is used as aiding to D2D communications but due to untrusting the relay, data protection from eavesdropping by relay is very important. According to this, two protocols direct transmission (DT) and relay transmission (RT) are considered for transmission in network. In the DT protocol, D2D pair directly and without relay aid and in the RT protocol, D2D pair use from relay for communication. In this paper, first, secrecy outage probability (SOP) and intercept probability and then trade-off between reliability and security presenting the closed-form relations for two protocols are investigated. Simulation results show the reliability of analytic relationships and show that in a steady intercept probability, DT protocol into RT protocol has a higher reliability. Also, the simulation results show that in RT, intercept probability is lower into the DT protocol and consequently security increases in RT into the DT protocol. Also the results confirm that increasing security increases the likelihood of loss of communication, and increasing the likelihood of reliable communication reduces communications security.


Main Subjects

[1]A. Kuhestani, A. Mohammadi, and P. L. Yeoh, "Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying Networks with an External Jammer," IEEE Transactions on Communications, vol. 66, no. 6, pp. 2671-2684, 2018.
[2]A. Kuhestani and A. Mohammadi, "Destination-based Cooperative Jamming in Untrusted Amplify-and-Forward Relay Networks: Resource Allocation and Performance Study," IET Communications, vol. 10, no. 1, pp. 17-23, Jan. 2016.
[3]A. Asadi, Q. Wang, and V. Mancuso, "A Survey on Device-to-Device Communication in Cellular Networks," IEEE Communications Surveys & Tutorials, vol. 16, pp. 1801-1819, 2014.
[4]O. N. Hamoud, T. Kenaza, and Y. Challal, "Security in Device-to-Device Communications: A Survey," IET Networks, vol. 7, no. 1, pp. 14-22, Jan. 2018.
[5]Y. Zhang, Y. Shen, X. Jiang, and S. Kasahara, "Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective," IEEE Transactions on Communications, Feb. 2018.
[6]Y. Yang, Y. Zhang, L. Dai, J. Li, S. Mumtaz, and J. Rodriguez, "Transmission Capacity Analysis of Relay-Assisted Device-to-Device Overlay/Underlay Communication," IEEE Transactions on Industrial Informatics, vol. 13, pp. 380-389, 2017.
[7]S. N. Islam, M. A. Mahmud, and A. M. T. Oo, "Achievable Sum Rate Analysis of Relay Aided Overlay Device to Device Communication Among Multiple Devices," Journal of Communications and Networks, vol. 19, pp. 309-318, 2017.
[8]M. Izanlou, A. Mohammadi, and M. Dosaranian-Moghadam, “Optimal Power Allocation for Physical Layer Security in Device-to-Device Communications using Untrusted Relays,” Transactions on Emerging Telecommunications Technologies,, 26 Apr. 2019.
[9] D. Chen,L. Wang,T. Yin, X. Xu, W. Yang,Y. Cai, and W. Yang, "Reliability and Security Performance Analysis of Non-Regenerative Untrusted Relay Networks," 2015 International Conference on Wireless Communications & Signal Processing (WCSP), Nanjing, pp. 1-5, 2015.
[10] J. Zhu, Y. Zou, B. Champagne, W. Zhu and L. Hanzo, "Security–Reliability Tradeoff Analysis of Multirelay-Aided Decode-and-Forward Cooperation Systems," IEEE Transactions on Vehicular Technology, vol. 65, no. 7, pp. 5825-5831, July 2016.
[11] A. Kuhestani, A. Mohammadi and P. L. Yeoh, "Security-Reliability Trade-off in Cyber-Physical Cooperative Systems with Non-Ideal Untrusted Relaying," 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, pp. 552-557, 2018.
[12 M. T. Mamaghani and R. Abbas, "Security and Reliability Performance Analysis for Two-Way Wireless Energy Harvesting based Untrusted Relaying with Cooperative Jamming," IET Communications, vol. 13, no. 4, pp. 449-459, 2019.
[13] J. Zhu, Z. Liu, Y. Jiang and Y. Zou, "Security-Reliability Tradeoff for Relay Selection in Cooperative Amplify-and-Forward Relay Networks," 2015 International Conference on Wireless Communications & Signal Processing (WCSP), Nanjing, 2015, pp. 1-4, 2015.
[14] Y. Zou, X. Wang, W. Shen and L. Hanzo, "Security Versus Reliability Analysis of Opportunistic Relaying," IEEE Transactions on Vehicular Technology, vol. 63, no. 6, pp. 2653-2661, July 2014.
[15]C. Zhang, J. Ge, F.Gong, F. Jia, and N. Guo, "Security-Reliability Tradeoff for Untrusted and       Selfish Relay-Assisted D2D Communications in Heterogeneous Cellular Networks for IoT," IEEE Systems Journal, pp. 1-10, 11 Sept 2019.
[16]I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products, 7th ed. New York: Academic, 2007.
[17]B. He, Y. She, and V. K. N. Lau, "Artificial Noise Injection for Securing Single-Antenna Systems", IEEE Transactions on Vehicular Technology, vol. 66, no. 10, pp. 9577 - 9581, Oct. 2017.
[18]T.-X. Zheng, H.-M. Wang, H. Deng, "Improving Anti-Eavesdropping Ability without Eavesdropper’s CSI: A Practical Secure Transmission Design Perspective," IEEE Wireless Communications Letters, vol. 7, no. 6, pp. 946 - 949,  Dec. 2018.