메뉴 건너뛰기




Volumn 63, Issue 1, 2015, Pages 1-10

Secure inter-cluster communications with cooperative jamming against social outcasts

Author keywords

Cooperative cluster; D2D communications; Jamming; Secrecy rate; Social trust

Indexed keywords

COCHANNEL INTERFERENCE; CONVEX OPTIMIZATION; ENERGY EFFICIENCY; JAMMING; MATHEMATICAL PROGRAMMING; MOBILE SECURITY; OPTIMIZATION; SIGNAL INTERFERENCE; SIGNAL TO NOISE RATIO; SPURIOUS SIGNAL NOISE;

EID: 84933181903     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2015.02.012     Document Type: Article
Times cited : (10)

References (25)
  • 1
    • 84883251302 scopus 로고    scopus 로고
    • Device-to-device communications underlaying cellular networks
    • Aug
    • D. Feng, L. Lu, Y. Wu, G. Y. Li, G. Feng, S. Li, Device-to-device communications underlaying cellular networks, IEEE Trans. Commun. 61 (8) (Aug. 2013) 3541-3551.
    • (2013) IEEE Trans. Commun. , vol.61 , Issue.8 , pp. 3541-3551
    • Feng, D.1    Lu, L.2    Wu, Y.3    Li, G.Y.4    Feng, G.5    Li, S.6
  • 2
    • 84881369407 scopus 로고    scopus 로고
    • Resource allocation for device-to-device communications overlaying two-way cellular networks
    • Jul
    • Y. Pei, Y. Liang, Resource allocation for device-to-device communications overlaying two-way cellular networks, IEEE Trans. Wireless Commun. 12 (7) (Jul. 2013) 3611-3621.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.7 , pp. 3611-3621
    • Pei, Y.1    Liang, Y.2
  • 3
    • 84893854826 scopus 로고    scopus 로고
    • Efficiency resource allocation for device-to-device underlay communication systems: A reverse iterative combinatorial auction based approach
    • C. Xu, L. Song, Z. Han, Q. Zhao, X. Wang, X. Cheng, B. Jiao, Efficiency resource allocation for device-to-device underlay communication systems: a reverse iterative combinatorial auction based approach, IEEE J. Sel. Areas Commun./Suppl. 31 (9) (2013) 348-358.
    • (2013) IEEE J. Sel. Areas Commun./Suppl. , vol.31 , Issue.9 , pp. 348-358
    • Xu, C.1    Song, L.2    Han, Z.3    Zhao, Q.4    Wang, X.5    Cheng, X.6    Jiao, B.7
  • 4
    • 84907966549 scopus 로고    scopus 로고
    • Fast pairing of device-to-device link underlay for spectrum sharing with cellular users
    • L. Wang, H. Wu, Fast pairing of device-to-device link underlay for spectrum sharing with cellular users, IEEE Commun. Lett. 18 (10) (2014) 1803-1806.
    • (2014) IEEE Commun. Lett. , vol.18 , Issue.10 , pp. 1803-1806
    • Wang, L.1    Wu, H.2
  • 5
    • 84860538226 scopus 로고    scopus 로고
    • Distance-constrained resource-sharing criteria for device-todevice communications underlaying cellular networks
    • H. Wang, X. Chu, Distance-constrained resource-sharing criteria for device-todevice communications underlaying cellular networks, Electron. Lett. 48 (9) (2012) 528-530.
    • (2012) Electron. Lett. , vol.48 , Issue.9 , pp. 528-530
    • Wang, H.1    Chu, X.2
  • 6
    • 84933181382 scopus 로고    scopus 로고
    • A cluster head assisted UE switching solution for device-to-device communications
    • Shanghai, China, April 11-12
    • J. Du, B. Zhou, J. Xu, Z. Li, H. Wang, L. Liu, A cluster head assisted UE switching solution for device-to-device communications, in: 7th International ICST Conference. (WICON2013), Shanghai, China, April 11-12, 2013, pp. 113-122.
    • (2013) 7th International ICST Conference. (WICON2013) , pp. 113-122
    • Du, J.1    Zhou, B.2    Xu, J.3    Li, Z.4    Wang, H.5    Liu, L.6
  • 7
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, The wire-tap channel, Bell Syst. Tech. J. 54 (8) (1975) 1355-1387.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 8
    • 84890430700 scopus 로고    scopus 로고
    • Secrecy-based access control for device-to-device communication underlaying cellular networks
    • J. Yue, C. Ma, H. Yu, W. Zhou, Secrecy-based access control for device-to-device communication underlaying cellular networks, IEEE Commun. Lett. 17 (11) (2013) 2068-2071.
    • (2013) IEEE Commun. Lett. , vol.17 , Issue.11 , pp. 2068-2071
    • Yue, J.1    Ma, C.2    Yu, H.3    Zhou, W.4
  • 9
    • 84901931363 scopus 로고    scopus 로고
    • Security-oriented cooperation scheme in wireless cooperative networks
    • L. Wang, L. Yang, J. X. Ma, M. Song, Security-oriented cooperation scheme in wireless cooperative networks, IET Commun. 8 (8) (2014) 1265-1273.
    • (2014) IET Commun. , vol.8 , Issue.8 , pp. 1265-1273
    • Wang, L.1    Yang, L.2    Ma, J.X.3    Song, M.4
  • 10
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszar, J. Korner, Broadcast channels with confidential messages, IEEE Trans. Inf. Theory 24 (3) (May 1978) 339-348.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszar, I.1    Korner, J.2
  • 11
    • 85008538314 scopus 로고    scopus 로고
    • Combined relay selection and cooperative beamforming for physical layer security
    • Aug
    • J. Kim, A. Ikhlef, R. Schober, Combined relay selection and cooperative beamforming for physical layer security, KICS J. Commun. Netw. 14 (4) (Aug. 2012) 364-373.
    • (2012) KICS J. Commun. Netw. , vol.14 , Issue.4 , pp. 364-373
    • Kim, J.1    Ikhlef, A.2    Schober, R.3
  • 12
    • 80052889357 scopus 로고    scopus 로고
    • Cooperative jamming for secure communications in MIMO relay networks
    • J. Huang, A. L. Swindlehurst, Cooperative jamming for secure communications in MIMO relay networks, IEEE Trans. Signal Process. 59 (10) (2011) 4871-4884.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.10 , pp. 4871-4884
    • Huang, J.1    Swindlehurst, A.L.2
  • 13
    • 84942279827 scopus 로고    scopus 로고
    • Device-to-device link admission policy based on social interaction information
    • L. Wang, H. Tang, M. Cierny, Device-to-device link admission policy based on social interaction information, IEEE Trans. Veh. Technol. 99(2014), http://dx.doi.org/10.1109/TVT.2014.2363520.
    • (2014) IEEE Trans. Veh. Technol. , vol.99
    • Wang, L.1    Tang, H.2    Cierny, M.3
  • 15
    • 84879249378 scopus 로고    scopus 로고
    • Intracluster device to device relay algorithm with optimal resource utilization
    • B. Zhou, H. L. Hu, S. Q. Huang, H. H. Chen, Intracluster device to device relay algorithm with optimal resource utilization, IEEE Trans. Veh. Technol. 62 (5) (2013) 2315-2326.
    • (2013) IEEE Trans. Veh. Technol. , vol.62 , Issue.5 , pp. 2315-2326
    • Zhou, B.1    Hu, H.L.2    Huang, S.Q.3    Chen, H.H.4
  • 20
    • 84864360310 scopus 로고    scopus 로고
    • Distributed stable matching algorithm for physical layer security with multiple source-destination pairs and jammer nodes
    • Paris, France, April
    • S. Bayat, R. Y. H. Louie, Z. Han, Y. Li, B. Vucetic, Distributed stable matching algorithm for physical layer security with multiple source-destination pairs and jammer nodes, in: Proc. IEEE Wireless Commun. and Network. Conf. (WCNC), Paris, France, April 2012, pp. 2466-2470.
    • (2012) Proc. IEEE Wireless Commun. and Network. Conf. (WCNC) , pp. 2466-2470
    • Bayat, S.1    Louie, R.Y.H.2    Han, Z.3    Li, Y.4    Vucetic, B.5
  • 24
    • 0023250226 scopus 로고
    • Solving mixed integer programming problems using automatic reformulation
    • T. J. Van, L. A. Wolsey, Solving mixed integer programming problems using automatic reformulation, Oper. Res. 35 (1) (1987) 45-57.
    • (1987) Oper. Res. , vol.35 , Issue.1 , pp. 45-57
    • Van, T.J.1    Wolsey, L.A.2
  • 25


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.