Device-to-device (D2D) communication as an underlay to cellular networks is a promising technology to meet the demand for high communication rate, low end-to-end delay, high spectral efficiency and energy efficiency, low traffic and low congestion for the cellular core network. However, it is essential to provide secure communication in LTE-A D2D mode for the success of D2D services. In this
... [Show full abstract] paper, we consider that there exists one case that the cellular user may eavesdrop the accessed D2D users for some important information illegitimately. As a result, we consider the higher secrecy rate of D2D users as our main target to pursue. At the same time, the lose on the achievable data rate of the cellular users should be taken into consideration. Then, a problem of combinatorial optimization must be solved. In this paper, a power research algorithm based on revised Lagrange multiplier method is designed to obtain a suboptimal solution of the problem of combinatorial optimization. Some simulations have been done to test the performance of our proposed power research algorithm.