Energy-Efficient and Secure Device-to-Device Communications in the Next-Generation Wireless Network

Date of Award


Degree Name

M.S. in Computer Engineering


Department of Electrical and Computer Engineering


Advisor: Feng Ye


Device-to-device (D2D) communication is a promising technology to improve energy efficiency and spectrum efficiency of the next-generation mobile networks. In this thesis, we first propose a D2D data off-loading scheme using game theoretical approach to reduce energy consumption for a wireless mobile network service provider. In the meantime, our proposed scheme provides a fair incentive mechanism to motivate D2D relay users for participation. The D2D scenario studied in this work focuses on downlink communications from the service provider to some users who request the same service, e.g., live streaming of a sports game. As an incentive, the service provider rewards some data usage to D2D relay users. In particular, we formulate a Stackelberg game to find the optimal portion of off-loading data for the relay users and the optimal incentive mechanism settings for the base station. With the proposed D2D off-loading scheme, a base station can maximize the energy saving while providing the most attraction to D2D relay users.Moreover, we propose a security scheme on the physical layer. The simulation results demonstrate that our proposed scheme will enhance the network energy efficiency and be attractive to D2D relay users. In particular, this scheme is to protect the data receivers in D2D communication areas form the eavesdroppers. In the proposed scheme, we derive the optimal transmitting power for each D2D relay so that data receivers can be provided with the highest security capacity. For each D2D relay, we consider the data receiver at the edge of the D2D communication area as it has the lowest signal-to-noise-and-interference ratio (SINR) compared to other receivers in this D2D coverage. We propose a near-far problem to guarantee that all the data receivers on the edge of D2D communication areas have the same SINR. Thus, all the data receivers are equally protected. For the attackers, we consider the one with the highest receiving SINR. Simulation result demonstrate that all data receivers can have a high security throughput.


Electrical Engineering, 5G, Energy Efficiency, Data offloading, Physical-layer security, Game theoretical approach

Rights Statement

Copyright © 2018, author