Secure Wireless Powered and Cooperative Jamming D2D Communications

Zheng Chu, Huan X. Nguyen, Tuan Anh Le, Mehmet Karamanoglu, Enver Ever, Adnan Yazici

Research output: Journal PublicationArticlepeer-review

37 Citations (Scopus)


This paper investigates a secure wireless-powered device-to-device (D2D) communication network in the presence of multiple eavesdroppers, where a hybrid base station (BS) in a cellular network not only provides power wirelessly for the D2D transmitter to guarantee power efficiency for the D2D network, but also serves as a cooperative jammer to interfere with the eavesdroppers. The cellular and D2D networks can belong to different service providers, which means that the D2D transmitter would need to pay for the energy service released by the hybrid BS to guarantee secure D2D communication. In order to exploit the hierarchical interaction between the BS and the D2D transmitter, we first formulate a Stackelberg game based energy trading scheme, where the quadratic energy cost model is considered. Then, a nonenergy trading based Stackelberg game is investigated to study the reversed roles of the BS and the D2D users. For comparison, we also formulate and resolve the social welfare optimization problem. We derive the closed-form Stackelberg equilibriums of the formulated games and the optimal solutions for the social welfare optimization problem. Simulation results are provided to validate our proposed schemes to highlight the importance of energy trading interaction between cellular and D2D networks.

Original languageEnglish
Pages (from-to)1-13
Number of pages13
JournalIEEE Transactions on Green Communications and Networking
Issue number1
Publication statusPublished - Mar 2018
Externally publishedYes


  • Stackelberg game
  • Wireless powered communication networks (WPCNs)
  • cooperative jammer (CJ)
  • device-to-device (D2D)
  • physical-layer secrecy

ASJC Scopus subject areas

  • Renewable Energy, Sustainability and the Environment
  • Computer Networks and Communications


Dive into the research topics of 'Secure Wireless Powered and Cooperative Jamming D2D Communications'. Together they form a unique fingerprint.

Cite this