메뉴 건너뛰기




Volumn 52, Issue 5, 2014, Pages 86-92

Device-to-device communication in 5G cellular networks: Challenges, solutions, and future directions

Author keywords

[No Author keywords available]

Indexed keywords

CELLULAR ARRAYS; CELLULAR TELEPHONE SYSTEMS; COMMUNICATION; TELECOMMUNICATION NETWORKS;

EID: 84901280134     PISSN: 01636804     EISSN: None     Source Type: Journal    
DOI: 10.1109/MCOM.2014.6815897     Document Type: Article
Times cited : (957)

References (14)
  • 1
    • 84863135352 scopus 로고    scopus 로고
    • Relaying operation in 3gpp lte: Challenges and solutions
    • Feb.
    • C. Hoymann et al., "Relaying Operation in 3GPP LTE: Challenges and Solutions," IEEE Commun. Mag., vol. 50, no. 2, Feb. 2012, pp. 156-62.
    • (2012) IEEE Commun. Mag. , vol.50 , Issue.2 , pp. 156-162
    • Hoymann, C.1
  • 2
    • 84880519654 scopus 로고    scopus 로고
    • Lte release 12 and beyond
    • D. Astely et al., "LTE Release 12 and Beyond," IEEE Commun. Mag., vol. 51, no. 7, 2013, pp. 154-60.
    • (2013) IEEE Commun. Mag. , vol.51 , Issue.7 , pp. 154-160
    • Astely, D.1
  • 3
    • 72949120015 scopus 로고    scopus 로고
    • Device-to-device communication as an underlay to lte-advanced networks
    • Dec.
    • K. Doppler et al., "Device-to-Device Communication as an Underlay to LTE-Advanced Networks," IEEE Commun. Mag., vol. 47, no. 12, Dec. 2009, pp. 42-49.
    • (2009) IEEE Commun. Mag. , vol.47 , Issue.12 , pp. 42-49
    • Doppler, K.1
  • 4
    • 84858121087 scopus 로고    scopus 로고
    • Design aspects of network assisted device-to-device communications
    • Mar.
    • G. Fodor et al., "Design Aspects of Network Assisted Device-to-Device Communications," IEEE Commun. Mag., vol. 50, no. 3, Mar. 2012, pp. 170-77.
    • (2012) IEEE Commun. Mag. , vol.50 , Issue.3 , pp. 170-177
    • Fodor, G.1
  • 5
    • 84863772559 scopus 로고    scopus 로고
    • Operator controlled device-to-device communications in lte-advanced networks
    • June 2012
    • L. Lei et al., "Operator Controlled Device-to-Device Communications in LTE-Advanced Networks," IEEE Wireless Commun., vol. 19, no. 3, June 2012, pp. 96-104.
    • IEEE Wireless Commun. , vol.19 , Issue.3 , pp. 96-104
    • Lei, L.1
  • 6
    • 84883251302 scopus 로고    scopus 로고
    • Device-to-device communications underlaying cellular networks
    • D. Feng et al., "Device-to-Device Communications Underlaying Cellular Networks," IEEE Trans. Commun., vol. 61, no. 8, 2013, pp. 3541-51.
    • (2013) IEEE Trans. Commun. , vol.61 , Issue.8 , pp. 3541-3551
    • Feng, D.1
  • 7
    • 70249090090 scopus 로고    scopus 로고
    • Trust in m2m communication
    • Sept.
    • I. Cha et al., "Trust in M2M Communication," IEEE Vehic. Tech. Mag., vol. 4, no. 3, Sept. 2009, pp. 69-75.
    • (2009) IEEE Vehic. Tech. Mag. , vol.4 , Issue.3 , pp. 69-75
    • Cha, I.1
  • 8
    • 84890430700 scopus 로고    scopus 로고
    • Secrecy-based access control for deviceto-device communication underlaying cellular networks
    • J. Yue et al., "Secrecy-Based Access Control for Deviceto-Device Communication Underlaying Cellular Networks," IEEE Commun. Letters, vol. 17, no. 11, 2013, pp. 2068-71.
    • (2013) IEEE Commun. Letters , vol.17 , Issue.11 , pp. 2068-2071
    • Yue, J.1
  • 9
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • June
    • A. Perrig, J. Stankovic, and D. Wagner, "Security in Wireless Sensor Networks," Commun. ACM, vol. 47, no. 6, June 2004, pp. 53-57.
    • (2004) Commun. ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 10
    • 70350692585 scopus 로고    scopus 로고
    • Securing wireless sensor networks: A survey
    • Y. Zhou, Y. Fang, and Y. Zhang, "Securing Wireless Sensor Networks: A Survey," IEEE Commun. Surveys Tutorials, vol. 10, no. 3, 2008, pp. 6-28.
    • (2008) IEEE Commun. Surveys Tutorials , vol.10 , Issue.3 , pp. 6-28
    • Zhou, Y.1    Fang, Y.2    Zhang, Y.3
  • 11
    • 84901290422 scopus 로고    scopus 로고
    • Jamming attack detection and countermeasures in wireless sensor network using ant system
    • May
    • R. Muraleedharan and L. A. Osadciw, "Jamming Attack Detection and Countermeasures in Wireless Sensor Network Using Ant System," Defense and Security Symp., May 2006, p. 62480G.
    • (2006) Defense and Security Symp , pp. 62480
    • Muraleedharan, R.1    Osadciw, L.A.2
  • 13
    • 84879249378 scopus 로고    scopus 로고
    • Intracluster device-to-device relay algorithm with optimal resource utilization
    • B. Zhou et al., "Intracluster Device-to-Device Relay Algorithm with Optimal Resource Utilization," IEEE Trans. Vehic. Tech., vol. 62, no. 5, 2013, pp. 2315-26.
    • (2013) IEEE Trans. Vehic. Tech. , vol.62 , Issue.5 , pp. 2315-2326
    • Zhou, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.