Secure Communications with D2D Cooperation

被引:0
|
作者
Ghanem, Samah A. M. [1 ]
Ara, Munnujahan [2 ]
机构
[1] Eurecom, Mobile Commun Dept, Sophia Antipolis, France
[2] Khulna Univ, Khulna 9208, Bangladesh
关键词
NETWORKS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Device to Device (D2D) communications provides a promising technique for 5G wireless networks, supporting higher data rates. Security of data transmission over wireless clouds could put constraints on devices; whether to cooperate or not. Therefore, our aim is to provide analytical framework for the security at the physical layer and to define the constraints em bodied with cooperation in wireless clouds I. In this paper, two legitimate transmitters Alice and John cooperate to increase the reliable transmission rate received by their common legitimate receiver Bob, where one eavesdropper, Eve exists. We propose a distributed algorithm that allows the devices to select whether to cooperate or not and to adapt their optimal power allocation based on the cooperation framework selected. Moreover, we define distance constraints to enforce the benefits of cooperation between devices in a wireless cloud.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] D2D Cooperative Communications for Disaster Management
    Chu, Zheng
    Nguyen, Huan X.
    Tuan Anh Le
    Karamanoglu, Mehmet
    To, Duc
    Ever, Enver
    Al-Turjman, Fadi
    Yazici, Adnan
    PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT 2017), 2017,
  • [32] On D2D Communications for Public Safety Applications
    Alnoman, Ali
    Anpalagan, Alagan
    2017 IEEE CANADA INTERNATIONAL HUMANITARIAN TECHNOLOGY CONFERENCE (IHTC), 2017,
  • [33] Resource Allocation Schemes for D2D Communications
    Zhao, Yuxin
    Pelletier, Benoit
    Pani, Diana
    2014 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2014,
  • [34] D2D Covert Communications With Safety Area
    Rao, Hangmei
    Wu, Mingming
    Wang, Jianquan
    Tang, Wanbin
    Xiao, Sa
    Li, Shaoqian
    IEEE SYSTEMS JOURNAL, 2021, 15 (02): : 2331 - 2341
  • [35] Applications of Interference Alignment in D2D Communications
    Li, Yunpeng
    Kaleem, Zeeshan
    Chang, KyungHi
    2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), 2015, : 993 - 995
  • [36] Power Allocation for D2D Communications With SWIPT
    Huang, Jun
    Xing, Cong-cong
    Guizani, Mohsen
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2020, 19 (04) : 2308 - 2320
  • [37] Enabling D2D Communications in LTE Networks
    Tsolkas, Dimitris
    Liotou, Eirini
    Passas, Nikos
    Merakos, Lazaros
    2013 IEEE 24TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2013, : 2846 - 2850
  • [38] Operational Region of Overlay D2D Communications
    Stefanatos, Stelios
    Gotsis, Antonis G.
    Alexiou, Angeliki
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 2541 - 2547
  • [39] Exploiting Geographical Context in D2D Communications
    Feki, Afef
    Duarte, Melissa
    Valentin, Stefan
    Rose, Luca
    2016 IEEE 84TH VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 2016,
  • [40] Social-Aware Based Secure Relay Selection in Relay-Assisted D2D Communications
    Yu, Shanshan
    Liu, Ju
    Zhang, Xiaoqing
    Wu, Shangbin
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 58 (02): : 505 - 516