{"title":"5G网络资源分配方案:一种使能保密的方法","authors":"Rishav Dubey, Pavan Kumar Mishra, S. Pandey","doi":"10.1109/ComPE53109.2021.9752179","DOIUrl":null,"url":null,"abstract":"The Device to Device (D2D) communication is adopted as one of the promising technologies in the 5G networks to tackle the higher demanding data rate. The D2D communication reuses the cellular user’s (CUs) spectrum to communicate with proximity users to provide spectral efficiency. However, the spectral efficiency of the cell may decrease when the resources (frequency allocation and power allocation) of the channels cannot be optimally allocated. In this study, we have proposed secrecy enabled resource allocation scheme for 5G network. The proposed scheme is rooted on a social group optimization (SGO) algorithm to enhance the secrecy rate of the considered networks. For this, we have considered a system where CUs and D2D users are located in a coverage area of eNodeB (eNB) where an eavesdropper (ED) is present to wiretap both the cellular users and D2D users’ channels. The objective of the proposed scheme is how to allocate the optimal resource allocation to the Cellular users and D2D users with the intention of enhancing the secrecy rate. To determine the solution, we have formulated an optimization problem with the constraint of minimum QoS guaranteed further we have proposed an SGO based solution. Additionally, we have conducted a simulation to examine the performance of our proposed scheme. The simulation results portray that our proposed scheme outperforms other related schemes cited in the literature.","PeriodicalId":211704,"journal":{"name":"2021 International Conference on Computational Performance Evaluation (ComPE)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Resource Allocation Scheme for 5G Networks: A Secrecy-Enabled Approach\",\"authors\":\"Rishav Dubey, Pavan Kumar Mishra, S. Pandey\",\"doi\":\"10.1109/ComPE53109.2021.9752179\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Device to Device (D2D) communication is adopted as one of the promising technologies in the 5G networks to tackle the higher demanding data rate. The D2D communication reuses the cellular user’s (CUs) spectrum to communicate with proximity users to provide spectral efficiency. However, the spectral efficiency of the cell may decrease when the resources (frequency allocation and power allocation) of the channels cannot be optimally allocated. In this study, we have proposed secrecy enabled resource allocation scheme for 5G network. The proposed scheme is rooted on a social group optimization (SGO) algorithm to enhance the secrecy rate of the considered networks. For this, we have considered a system where CUs and D2D users are located in a coverage area of eNodeB (eNB) where an eavesdropper (ED) is present to wiretap both the cellular users and D2D users’ channels. The objective of the proposed scheme is how to allocate the optimal resource allocation to the Cellular users and D2D users with the intention of enhancing the secrecy rate. To determine the solution, we have formulated an optimization problem with the constraint of minimum QoS guaranteed further we have proposed an SGO based solution. Additionally, we have conducted a simulation to examine the performance of our proposed scheme. The simulation results portray that our proposed scheme outperforms other related schemes cited in the literature.\",\"PeriodicalId\":211704,\"journal\":{\"name\":\"2021 International Conference on Computational Performance Evaluation (ComPE)\",\"volume\":\"41 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Computational Performance Evaluation (ComPE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ComPE53109.2021.9752179\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computational Performance Evaluation (ComPE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ComPE53109.2021.9752179","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Resource Allocation Scheme for 5G Networks: A Secrecy-Enabled Approach
The Device to Device (D2D) communication is adopted as one of the promising technologies in the 5G networks to tackle the higher demanding data rate. The D2D communication reuses the cellular user’s (CUs) spectrum to communicate with proximity users to provide spectral efficiency. However, the spectral efficiency of the cell may decrease when the resources (frequency allocation and power allocation) of the channels cannot be optimally allocated. In this study, we have proposed secrecy enabled resource allocation scheme for 5G network. The proposed scheme is rooted on a social group optimization (SGO) algorithm to enhance the secrecy rate of the considered networks. For this, we have considered a system where CUs and D2D users are located in a coverage area of eNodeB (eNB) where an eavesdropper (ED) is present to wiretap both the cellular users and D2D users’ channels. The objective of the proposed scheme is how to allocate the optimal resource allocation to the Cellular users and D2D users with the intention of enhancing the secrecy rate. To determine the solution, we have formulated an optimization problem with the constraint of minimum QoS guaranteed further we have proposed an SGO based solution. Additionally, we have conducted a simulation to examine the performance of our proposed scheme. The simulation results portray that our proposed scheme outperforms other related schemes cited in the literature.