메뉴 건너뛰기




Volumn 63, Issue 1, 2015, Pages 229-242

Interference exploitation in D2D-enabled cellular networks: A secrecy perspective

Author keywords

cellular network; D2D communication; link scheduling; physical layer security; stochastic geometry

Indexed keywords

CELLULAR RADIO SYSTEMS; GEOMETRY; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK LAYERS; PROBABILITY DISTRIBUTIONS; SCHEDULING; SIGNAL INTERFERENCE; SIGNAL TO NOISE RATIO; SPURIOUS SIGNAL NOISE; STOCHASTIC MODELS; STOCHASTIC SYSTEMS; WIRELESS NETWORKS;

EID: 84921323282     PISSN: 00906778     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCOMM.2014.2379633     Document Type: Article
Times cited : (152)

References (36)
  • 1
    • 84858121087 scopus 로고    scopus 로고
    • Design aspects of network assisted device-to-device communications
    • Mar.
    • G. Fodor et al., "Design aspects of network assisted device-to-device communications," IEEE Commun. Mag., vol. 50, no. 3, pp. 170-177, Mar. 2012.
    • (2012) IEEE Commun. Mag. , vol.50 , Issue.3 , pp. 170-177
    • Fodor, G.1
  • 2
    • 72949120015 scopus 로고    scopus 로고
    • Device-todevice communication as an underlay to LTE-advanced networks
    • Dec.
    • K. Doppler, M. Rinne, C. Wijting, C. Ribeiro, and K. Hugl, "Device-todevice communication as an underlay to LTE-advanced networks," IEEE Commun. Mag., vol. 47, no. 12, pp. 42-49, Dec. 2009.
    • (2009) IEEE Commun. Mag. , vol.47 , Issue.12 , pp. 42-49
    • Doppler, K.1    Rinne, M.2    Wijting, C.3    Ribeiro, C.4    Hugl, K.5
  • 7
    • 84893854826 scopus 로고    scopus 로고
    • Efficiency resource allocation for device-to-device underlay communication systems: A reverse iterative combinatorial auction based approach
    • Sep.
    • C. Xu et al., "Efficiency resource allocation for device-to-device underlay communication systems: A reverse iterative combinatorial auction based approach," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 348-358, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 348-358
    • Xu, C.1
  • 8
    • 84875631603 scopus 로고    scopus 로고
    • Spectrum sharing scheme between cellular users and Ad-hoc device-to-device users
    • Mar.
    • B. Kaufman, J. Lilleberg, and B. Aazhang, "Spectrum sharing scheme between cellular users and Ad-Hoc device-to-device users," IEEE Trans. Wireless Commun., vol. 12, no. 3, pp. 1038-1049, Mar. 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.3 , pp. 1038-1049
    • Kaufman, B.1    Lilleberg, J.2    Aazhang, B.3
  • 9
    • 84881369407 scopus 로고    scopus 로고
    • Resource allocation for device-to-device communications overlaying two-way cellular networks
    • Jul.
    • Y. Pei and Y.-C. Liang, "Resource allocation for device-to-device communications overlaying two-way cellular networks," IEEE Trans. Wireless Commun., vol. 12, no. 7, pp. 3611-3621, Jul. 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.7 , pp. 3611-3621
    • Pei, Y.1    Liang, Y.-C.2
  • 10
    • 84916897705 scopus 로고    scopus 로고
    • On applying network coding in network assisted device-to-device communications
    • May
    • G. Fodor, A. Pradini, and A. Gattami, "On applying network coding in network assisted device-to-device communications," in Proc. Eur. Wireless Conf., May 2014, pp. 1-6.
    • (2014) Proc. Eur. Wireless Conf. , pp. 1-6
    • Fodor, G.1    Pradini, A.2    Gattami, A.3
  • 11
    • 79951679288 scopus 로고    scopus 로고
    • Reliability improvement using receive mode selection in the device-to-device uplink period underlaying cellular networks
    • Feb.
    • H. Min, W. Seo, J. Lee, S. Park, and D. Hong, "Reliability improvement using receive mode selection in the device-to-device uplink period underlaying cellular networks," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 413-418, Feb. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.2 , pp. 413-418
    • Min, H.1    Seo, W.2    Lee, J.3    Park, S.4    Hong, D.5
  • 12
    • 84904129649 scopus 로고    scopus 로고
    • Cooperative relaying schemes for device-to-device communication underlaying cellular networks
    • Dec.
    • C. Ma et al., "Cooperative relaying schemes for device-to-device communication underlaying cellular networks," in Proc. IEEE GLOBECOM, Dec. 2013, pp. 3995-4000.
    • (2013) Proc. IEEE GLOBECOM , pp. 3995-4000
    • Ma, C.1
  • 13
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 14
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 15
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • Jun.
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 16
    • 79955491895 scopus 로고    scopus 로고
    • Interference assisted secret communication
    • May
    • X. Tang, R. Liu, P. Spasojevic, and H. Poor, "Interference assisted secret communication," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3153-3167, May 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.5 , pp. 3153-3167
    • Tang, X.1    Liu, R.2    Spasojevic, P.3    Poor, H.4
  • 17
    • 84890430700 scopus 로고    scopus 로고
    • Secrecy-based access control for device-to-device communication underlaying cellular networks
    • Nov.
    • J. Yue, C. Ma, H. Yu, and W. Zhou, "Secrecy-based access control for device-to-device communication underlaying cellular networks," IEEE Commun. Lett., vol. 17, no. 11, pp. 2068-2071, Nov. 2013.
    • (2013) IEEE Commun. Lett. , vol.17 , Issue.11 , pp. 2068-2071
    • Yue, J.1    Ma, C.2    Yu, H.3    Zhou, W.4
  • 18
    • 84876479369 scopus 로고    scopus 로고
    • RISE: A reliable and secure scheme for wireless machine to machine communications
    • Feb.
    • W. Ren, L. Yu, L. Ma, and Y. Ren, "RISE: A reliable and secure scheme for wireless machine to machine communications," Tsinghua Sci. Technol., vol. 18, no. 1, pp. 100-117, Feb. 2013.
    • (2013) Tsinghua Sci. Technol. , vol.18 , Issue.1 , pp. 100-117
    • Ren, W.1    Yu, L.2    Ma, L.3    Ren, Y.4
  • 20
    • 52349086199 scopus 로고    scopus 로고
    • The secrecy graph and some of its properties
    • Jul.
    • M. Haenggi, "The secrecy graph and some of its properties," in Proc. IEEE ISIT, Jul. 2008, pp. 539-543.
    • (2008) Proc. IEEE ISIT , pp. 539-543
    • Haenggi, M.1
  • 21
    • 84855923041 scopus 로고    scopus 로고
    • Secure communication in stochastic wireless networks
    • Feb.
    • P. C. Pinto, J. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 125-138, Feb. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.1 , pp. 125-138
    • Pinto, P.C.1    Barros, J.2    Win, M.Z.3
  • 22
    • 84860402665 scopus 로고    scopus 로고
    • On the throughput cost of physical layer security in decentralized wireless networks
    • Aug.
    • X. Zhou, R. K. Ganti, J. G. Andrews, and A. Hjorungnes, "On the throughput cost of physical layer security in decentralized wireless networks," IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2764-2775, Aug. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.8 , pp. 2764-2775
    • Zhou, X.1    Ganti, R.K.2    Andrews, J.G.3    Hjorungnes, A.4
  • 23
    • 84880159277 scopus 로고    scopus 로고
    • Physical layer security in cellular networks: A stochastic geometry approach
    • Jun.
    • H. Wang, X. Zhou, and M. Reed, "Physical layer security in cellular networks: A stochastic geometry approach," IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2776-2787, Jun. 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.6 , pp. 2776-2787
    • Wang, H.1    Zhou, X.2    Reed, M.3
  • 24
    • 84894743905 scopus 로고    scopus 로고
    • Asymptotic analysis on secrecy capacity in large-scale wireless networks
    • Feb.
    • J. Zhang, L. Fu, and X. Wang, "Asymptotic analysis on secrecy capacity in large-scale wireless networks," IEEE/ACM Trans. Netw., vol. 22, no. 1, pp. 66-79, Feb. 2014.
    • (2014) IEEE/ACM Trans. Netw. , vol.22 , Issue.1 , pp. 66-79
    • Zhang, J.1    Fu, L.2    Wang, X.3
  • 25
    • 79957978453 scopus 로고    scopus 로고
    • Stochastic geometry and random graphs for the analysis and design of wireless networks
    • Sep.
    • M. Haenggi, J. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, "Stochastic geometry and random graphs for the analysis and design of wireless networks," IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1029-1046, Sep. 2009.
    • (2009) IEEE J. Sel. Areas Commun. , vol.27 , Issue.7 , pp. 1029-1046
    • Haenggi, M.1    Andrews, J.2    Baccelli, F.3    Dousse, O.4    Franceschetti, M.5
  • 26
    • 31744449612 scopus 로고    scopus 로고
    • An aloha protocol for multihop mobile wireless networks
    • Feb.
    • F. Baccelli, B. Blaszczyszyn, and P. Muhlethaler, "An aloha protocol for multihop mobile wireless networks," IEEE Trans. Inf. Theory, vol. 52, no. 2, pp. 421-436, Feb. 2006.
    • (2006) IEEE Trans. Inf. Theory , vol.52 , Issue.2 , pp. 421-436
    • Baccelli, F.1    Blaszczyszyn, B.2    Muhlethaler, P.3
  • 27
    • 84856846185 scopus 로고    scopus 로고
    • Transmission capacity of ad-hoc networks with multiple antennas using transmit stream adaptation and interference cancellation
    • Feb.
    • R. Vaze and R. Heath, "Transmission capacity of ad-hoc networks with multiple antennas using transmit stream adaptation and interference cancellation," IEEE Trans. Inf. Theory, vol. 58, no. 2, pp. 780-792, Feb. 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.2 , pp. 780-792
    • Vaze, R.1    Heath, R.2
  • 28
    • 82455167943 scopus 로고    scopus 로고
    • A tractable approach to coverage and rate in cellular networks
    • Nov.
    • J. Andrews, F. Baccelli, and R. Ganti, "A tractable approach to coverage and rate in cellular networks," IEEE Trans. Commun., vol. 59, no. 11, pp. 3122-3134, Nov. 2011.
    • (2011) IEEE Trans. Commun. , vol.59 , Issue.11 , pp. 3122-3134
    • Andrews, J.1    Baccelli, F.2    Ganti, R.3
  • 29
    • 84859052098 scopus 로고    scopus 로고
    • Modeling and analysis of k-tier downlink heterogeneous cellular networks
    • Apr.
    • H. Dhillon, R. Ganti, F. Baccelli, and J. Andrews, "Modeling and analysis of k-tier downlink heterogeneous cellular networks," IEEE J. Sel. Areas Commun., vol. 30, no. 3, pp. 550-560, Apr. 2012.
    • (2012) IEEE J. Sel. Areas Commun. , vol.30 , Issue.3 , pp. 550-560
    • Dhillon, H.1    Ganti, R.2    Baccelli, F.3    Andrews, J.4
  • 30
    • 84904137444 scopus 로고    scopus 로고
    • Optimal spectrum partition and mode selection in device-to-device overlaid cellular networks
    • Dec.
    • X. Lin and J. G. Andrews, "Optimal spectrum partition and mode selection in device-to-device overlaid cellular networks," in Proc. IEEE GLOBECOM, Dec. 2013, pp. 1837-1842.
    • (2013) Proc. IEEE GLOBECOM , pp. 1837-1842
    • Lin, X.1    Andrews, J.G.2
  • 31
    • 84906242214 scopus 로고    scopus 로고
    • Modeling, analysis and optimization of multicast device-to-device transmissions
    • Aug.
    • X. Lin, R. Ratasuk, A. Ghosh, and J. Andrews, "Modeling, analysis and optimization of multicast device-to-device transmissions," IEEE Trans. Wireless Commun., vol. 13, no. 8, pp. 4346-4359, Aug. 2014.
    • (2014) IEEE Trans. Wireless Commun. , vol.13 , Issue.8 , pp. 4346-4359
    • Lin, X.1    Ratasuk, R.2    Ghosh, A.3    Andrews, J.4
  • 32
    • 84904088598 scopus 로고    scopus 로고
    • Device-todevice modeling and analysis with a modified matern hardcore BS location model
    • Dec.
    • Q. Ye, M. Al-Shalash, C. Caramanis, and J. G. Andrews, "Device-todevice modeling and analysis with a modified matern hardcore BS location model," in Proc. IEEE GLOBECOM, Dec. 2013, pp. 1825-1830.
    • (2013) Proc. IEEE GLOBECOM , pp. 1825-1830
    • Ye, Q.1    Al-Shalash, M.2    Caramanis, C.3    Andrews, J.G.4
  • 33
    • 84871945106 scopus 로고    scopus 로고
    • Secure node packing of large-scale wireless networks
    • Jun.
    • J. Lee, H. Shin, and M. Win, "Secure node packing of large-scale wireless networks," in Proc. IEEE ICC, Jun. 2012, pp. 815-819.
    • (2012) Proc. IEEE ICC , pp. 815-819
    • Lee, J.1    Shin, H.2    Win, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.