On the Sum Secrecy Rate Maximisation for Wireless Vehicular Networks (2401.17522v2)
Abstract: Wireless communications form the backbone of future vehicular networks, playing a critical role in applications ranging from traffic control to vehicular road safety. However, the dynamic structure of these networks creates security vulnerabilities, making security considerations an integral part of network design. We address these security concerns from a physical layer security aspect by investigating achievable secrecy rates in wireless vehicular networks. Specifically, we aim to maximize the sum secrecy rate from all vehicular pairs subject to bandwidth and power resource constraints. For the considered problem, we first propose a solution based on the successive convex approximation (SCA) method, which has not been applied in this context before. To further reduce the complexity of the SCA-based method, we also propose a low-complexity solution based on a fast iterative shrinkage-thresholding algorithm (FISTA). Our simulation results for SCA and FISTA show a trade-off between convergence and runtime. While the SCA method achieves better convergence, the FISTA-based approach is at least 300 times faster than the SCA method.
- X. Luo, Y. Liu, H.-H. Chen, and Q. Guo, “Physical layer security in intelligently connected vehicle networks,” IEEE Network, vol. 34, no. 5, pp. 232–239, 2020.
- A. Talpur and M. Gurusamy, “Machine learning for security in vehicular networks: A comprehensive survey,” IEEE Commun. Surveys Tuts., vol. 24, no. 1, pp. 346–379, 2022.
- J.-H. Lee, “Optimal power allocation for physical layer security in multi-hop DF relay networks,” IEEE Trans. Wireless Commun., vol. 15, no. 1, pp. 28–38, 2016.
- L. Lai and H. El Gamal, “The relay–eavesdropper channel: Cooperation for secrecy,” IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005–4019, 2008.
- L. J. Rodriguez, N. H. Tran, T. Q. Duong, T. Le-Ngoc, M. Elkashlan, and S. Shetty, “Physical layer security in wireless cooperative relay networks: state of the art and beyond,” IEEE Commun. Mag., vol. 53, no. 12, pp. 32–39, 2015.
- B. M. ElHalawany, A. A. A. El-Banna, and K. Wu, “Physical-layer security and privacy for vehicle-to-everything,” IEEE Commun. Mag., vol. 57, no. 10, pp. 84–90, 2019.
- U. Maurer, “Secret key agreement by public discussion from common information,” IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733–742, 1993.
- N. Cai and R. W. Yeung, “Secure network coding on a wiretap network,” IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 424–435, 2011.
- R. Barskar, M. Ahirwar, and R. Vishwakarma, “Secure key management in vehicular ad-hoc network: A review,” in Int. Conf. Signal Process. Commun. Power Embedded Syst. (SCOPES), pp. 1688–1694, 2016.
- W. Yang, R. Zhang, C. Chen, and X. Cheng, “Secrecy-based resource allocation for vehicular communication networks with outdated csi,” in IEEE Veh. Technol. Conf. (VTC)-Fall), pp. 1–5, 2017.
- L. Liang, H. Ye, G. Yu, and G. Y. Li, “Deep-learning-based wireless resource allocation with application to vehicular networks,” Proceedings of the IEEE, vol. 108, no. 2, pp. 341–356, 2020.
- Y. Liu et al., “Secrecy rate maximization via radio resource allocation in cellular underlaying V2V communications,” IEEE Trans. Veh. Technol., vol. 69, pp. 7281–7294, July 2020.
- A. Beck, First-order methods in optimization. SIAM, 2017.
- C. Cseh, “Architecture of the dedicated short-range communications (DSRC) protocol,” in IEEE Veh. Technol. Conf. (VTC), vol. 3, pp. 2095–2099 vol.3, 1998.
- Y.-S. Shiu, S. Y. Chang, H.-C. Wu, S. C.-H. Huang, and H.-H. Chen, “Physical layer security in wireless networks: a tutorial,” IEEE Wireless Communications, vol. 18, no. 2, pp. 66–74, 2011.
- H. Q. Ngo, L.-N. Tran, T. Q. Duong, M. Matthaiou, and E. G. Larsson, “On the total energy efficiency of cell-free massive MIMO,” IEEE Trans. Green Commun. Netw., vol. 2, no. 1, pp. 25–39, 2018.
- M. Farooq, T. T. Vu, H. Q. Ngo, and L.-N. Tran, “Massive MIMO for serving federated learning and non-federated learning users,” IEEE Trans. Wireless Commun., vol. 23, no. 1, pp. 247–262, 2024.
- C. V. S. C. Consortium et al., “Vehicle safety communications project (final report),” 2005.
- C. Zhang, X. Lin, R. Lu, and P.-H. Ho, “RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks,” in IEEE Int. Conf. Commun. (ICC), pp. 1451–1457, 2008.
- T. L. Willke, P. Tientrakool, and N. F. Maxemchuk, “A survey of inter-vehicle communication protocols and their applications,” IEEE Commun. Surveys Tuts., vol. 11, no. 2, pp. 3–20, 2009.
- A. Mosek, “The MOSEK optimization toolbox for MATLAB manual. version 7.1 (revision 28),” http://mosek. com,(accessed on March 20, 2015), 2015.
- J. Lofberg, “Yalmip: A toolbox for modeling and optimization in MATLAB,” in IEEE Int. Conf. Robot. Automat. (ICRA), pp. 284–289, IEEE, 2004.
Sponsor
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.