Secure Communications with D2D Cooperation

被引:0
|
作者
Ghanem, Samah A. M. [1 ]
Ara, Munnujahan [2 ]
机构
[1] Eurecom, Mobile Commun Dept, Sophia Antipolis, France
[2] Khulna Univ, Khulna 9208, Bangladesh
关键词
NETWORKS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Device to Device (D2D) communications provides a promising technique for 5G wireless networks, supporting higher data rates. Security of data transmission over wireless clouds could put constraints on devices; whether to cooperate or not. Therefore, our aim is to provide analytical framework for the security at the physical layer and to define the constraints em bodied with cooperation in wireless clouds I. In this paper, two legitimate transmitters Alice and John cooperate to increase the reliable transmission rate received by their common legitimate receiver Bob, where one eavesdropper, Eve exists. We propose a distributed algorithm that allows the devices to select whether to cooperate or not and to adapt their optimal power allocation based on the cooperation framework selected. Moreover, we define distance constraints to enforce the benefits of cooperation between devices in a wireless cloud.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Secure Beamforming Design for SWIPT in Cooperative D2D Communications
    Li Jiang
    Cheng Qin
    Xixi Zhang
    Hui Tian
    中国通信, 2017, 14 (01) : 20 - 33
  • [2] Secure Wireless Powered and Cooperative Jamming D2D Communications
    Chu, Zheng
    Nguyen, Huan X.
    Tuan Anh Le
    Karamanoglu, Mehmet
    Ever, Enver
    Yazici, Adnan
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2018, 2 (01): : 1 - 13
  • [3] Secure Beamforming Design for SWIPT in Cooperative D2D Communications
    Jiang, Li
    Qin, Cheng
    Zhang, Xixi
    Tian, Hui
    CHINA COMMUNICATIONS, 2017, 14 (01) : 20 - 33
  • [4] A Lightweight and Secure Data Sharing Protocol for D2D Communications
    Mohseni-Ejiyeh, Atefeh
    Ashouri-Talouki, Maede
    Mahdavi, Mojtaba
    2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 42 - 47
  • [5] Modeling and Analysis on M-RATs Cooperation for D2D Communications
    Liu, Chun-Peng
    He, Chen-Guang
    Meng, Wei-Xiao
    Li, Cheng
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [6] Resource Allocation for Secure SWIPT-Enabled D2D Communications With α Fairness
    Xu, Yongjun
    Gu, Bowen
    Li, Dong
    Yang, Zhaohui
    Huang, Chongwen
    Wong, Kai-Kit
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (01) : 1101 - 1106
  • [7] Delivering Multicast Content Through Secure D2D Communications in the Internet of Things
    Suraci, Chiara
    Pizzi, Sara
    Iera, Antonio
    Molinaro, Antonella
    Araniti, Giuseppe
    WIRED/WIRELESS INTERNET COMMUNICATIONS, WWIC 2019, 2019, 11618 : 182 - 193
  • [8] Secure Transmission in Underlay D2D Communications Using Optimal Relay Selection
    Khoshafa, Majid H.
    Ngatched, Telex M. N.
    Ahmed, Mohamed H.
    2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL), 2020,
  • [9] Turning Competition Onto Cooperation in D2D Communications: A Quitting Game Perspective
    Driouech, Safaa
    Sabir, Essaid
    2018 25TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2018, : 505 - 510
  • [10] Security in D2D Communications: A Review
    Wang, Mingjun
    Yan, Zheng
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1199 - 1204