| 16 | 0 | 18 |
| Downloads | Citas | Reads |
Vehicular communication systems rely on secure vehicle-to-vehicle(V2V) communications for safety-critical information exchange. However, the presence of eavesdropping vehicles poses a significant challenge. This paper investigates the security of V2V communications in reconfigurable intelligent surface(RIS)-assisted vehicular communication systems with spectrum sharing. It proposes a three-stage alternating optimization(TSAO) algorithm to address the complex problem of multiple eavesdropped V2V links that reuse the spectrum already occupied by vehicle-to-infrastructure(V2I) links. To solve the mixed-integer and non-convex optimization problem due to coupled variables and complex constraints, the algorithm decomposes the original problem into three easily solvable sub-problems: RIS reflection coefficient optimization, vehicle transmission power optimization, and spectrum sharing optimization. First, the RIS reflection coefficients are optimized by using the penalty convex-concave procedure(CCP) method. Second, the optimal power points are determined in the power optimization sub-problem. Finally, the spectrum sharing optimization sub-problem is constructed as a weighted bipartite graph matching problem and solved by using the optimal matching algorithm. The TSAO algorithm not only maximizes the sum V2V secrecy rate but also ensures the quality-of-service(QoS) requirements of the V2I links. Simulation results validate the superiority of the proposed algorithm and highlight the improvement in the sum V2V secrecy rate achieved by utilizing RIS technology in vehicular communication systems with spectrum sharing.
[1] ZHOU H B,XU W C,CHEN J C,et al.Evolutionary V2X technologies toward the Internet of vehicles:challenges and opportunities[J].Proceedings of the IEEE,2020,108(2):308-323.
[2] WU S J,YANG Q,HONG X M.Joint spectrum resource allocation and power control for LTE-V2V communication[C]//2022 IEEE 16th International Conference on Anti-counterfeiting,Security,and Identification (ASID),Xiamen,China.New York:IEEE,2022:44-48.
[3] RAVI B,THANGARAJ J.Stochastic traffic flow modeling for multi-hop cooperative data dissemination in VANETs[J].Physical Communication,2021,46:101290.
[4] CHEN Y B,WANG Y,ZHANG J Y,et al.QoS-driven spectrum sharing for reconfigurable intelligent surfaces (RISs) aided vehicular networks[J].IEEE Transactions on Wireless Communications,2021,20(9):5969-5985.
[5] LIU Y L,WANG W,CHEN H H,et al.Secrecy rate maximization via radio resource allocation in cellular underlaying V2V communications[J].IEEE Transactions on Vehicular Technology,2020,69(7):7281-7294.
[6] SHARMA S,KAUL A,AHMED S,et al.A detailed tutorial survey on VANETs:emerging architectures,applications,security issues,and solutions[J].International Journal of Communication Systems,2021,34(14):e4905.
[7] THENUA R K,GANDHI A S,SINGH S K.Sum rate maximization for RIS-assisted NOMA-enabled underlay AmBC-CR networks[J].Physical Communication,2024,64:102358.
[8] GONG S,LU X,HOANG D T,et al.Toward smart wireless communications via intelligent reflecting surfaces:a contemporary survey[J].IEEE Communications Surveys & Tutorials,2020,22(4):2283-2314.
[9] CHEN Z,MA X Y,HAN C,et al.Towards intelligent reflecting surface empowered 6G terahertz communications:a survey[J].China Communications,2021,18(5):93-119.
[10] TAN X,SUN Z,JORNET J M,et al.Increasing indoor spectrum sharing capacity using smart reflect-array[C]//2016 IEEE International Conference on Communications (ICC),Kuala Lumpur,Malaysia.New York:IEEE,2016:1-6.
[11] YE H,LI G Y.Deep reinforcement learning based distributed resource allocation for V2V broadcasting[C]//2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC),Limassol,Cyprus.New York:IEEE,2018:440-445.
[12] ZHOU Y B,TANG F X,KAWAMOTO Y,et al.Reinforcement learning-based radio resource control in 5G vehicular network[J].IEEE Wireless Communications Letters,2020,9(5):611-614.
[13] TANG F X,FADLULLAH Z M,KATO N,et al.AC-POCA:anticoordination game based partially overlapping channels assignment in combined UAV and D2D-based networks[J].IEEE Transactions on Vehicular Technology,2018,67(2):1672-1683.
[14] WANG L,LIU J M,CHEN M K,et al.Optimization-based access assignment scheme for physical-layer security in D2D communications underlaying a cellular network[J].IEEE Transactions on Vehicular Technology,2018,67(7):5766-5777.
[15] GU X H,DUAN W,ZHANG G A,et al.Socially aware V2X networks with RIS:joint resource optimization[J].IEEE Transactions on Vehicular Technology,2022,71(6):6732-6737.
[16] DONG L M,WANG H M,XIAO H T.Secure cognitive radio communication via intelligent reflecting surface[J].IEEE Transactions on Communications,2021,69(7):4678-4690.
[17] AI Y,DEFIGUEIREDO F A P,KONG L,et al.Secure vehicular communications through reconfigurable intelligent surfaces[J].IEEE Transactions on Vehicular Technology,2021,70(7):7272-7276.
[18] CUI M,ZHANG G C,ZHANG R.Secure wireless communication via intelligent reflecting surface[J].IEEE Wireless Communications Letters,2019,8(5):1410-1414.
[19] LUO X W,CHEN H H,MENG W X.How much can radio resource allocation help to improve secrecy capacity of V2V underlay cellular networks?[J].IEEE Transactions on Vehicular Technology,2020,69(12):14932-14944.
[20] LI Y Z,ZOU Y L,ZHU J,et al.Sum secrecy rate maximization for active RIS-assisted uplink SIMO-NOMA networks[J].IEEE Communications Letters,2024,28(3):722-726.
[21] GHADI F R,KAVEH M,WONG K K,et al.Physical layer security performance of cooperative dual-RIS-aided V2V NOMA communications[J].IEEE Systems Journal,2024,18(4):2074-2084.
[22] GUO C T,LIANG L,LI G Y.Resource allocation for vehicular communications with low latency and high reliability[J].IEEE Transactions on Wireless Communications,2019,18(8):3887-3902.
[23] GUO C T,LIANG L,LI G Y.Resource allocation for low-latency vehicular communications:an effective capacity perspective[J].IEEE Journal on Selected Areas in Communications,2019,37(4):905-917.
[24] ZHANG J B,FU L Y,WANG X B.Asymptotic analysis on secrecy capacity in large-scale wireless networks[J].IEEE/ACM Transactions on Networking,2014,22(1):66-79.
[25] AHMED M,SHI H,CHEN X L,et al.Socially aware secrecy-ensured resource allocation in D2D underlay communication:an overlapping coalitional game scheme[J].IEEE Transactions on Wireless Communications,2018,17(6):4118-4133.
[26] LIPP T,BOYD S.Variations and extension of the convex-concave procedure[J].Optimization and Engineering,2016,17(2):263-287.
[27] GRANT M,BOYD S.CVX:MATLAB software for disciplined convex programming,version 2.0 beta[EB/OL].[2024-05-04].https://cvxr.com/cvx.
[28] BERTSEKAS D P.Nonlinear programming[J].Journal of the Operational Research Society,1997,48(3):334.
[29] KUHN H W.Variants of the Hungarian method for assignment problems[J].Naval Research Logistics Quarterly,1956,3(4):253-258.
[30] 3GPP.3GPP TR 36.885 V14.0.0 (2016-06) Technical Report[R/OL].[2024-10-01].https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2934.
[31] ZHANG H,WANG T Y,SONG L Y,et al.Radio resource allocation for physical-layer security in D2D underlay communications[C]//2014 IEEE International Conference on Communications (ICC).New York:IEEE,2014:2319-2324.
Basic Information:
DOI:10.19884/j.1672-5220.202411019
China Classification Code:U495;TN92;TP18
Citation Information:
[1]LI Zhiwei,LI Demin,CHEN Xuemin.Sum V2V Secrecy Rate Maximization for RIS-Assisted Vehicular Communication Systems with Spectrum Sharing[J].Journal of Donghua University (English Edition),2026,43(01):68-79.DOI:10.19884/j.1672-5220.202411019.
Fund Information:
National Natural Science Foundation of China (Nos. 61772130, 71171045 and 61901104); Innovation Program of Shanghai Municipal Education Commission,China (No. 14YZ130)