메뉴 건너뛰기




Volumn , Issue , 2015, Pages

Cooperation via spectrum sharing for physical layer security in device-to-device communications underlaying cellular networks

Author keywords

[No Author keywords available]

Indexed keywords

MOBILE TELECOMMUNICATION SYSTEMS; NETWORK SECURITY; WIRELESS NETWORKS;

EID: 84964860132     PISSN: 23340983     EISSN: 25766813     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2014.7417724     Document Type: Conference Paper
Times cited : (12)

References (17)
  • 1
    • 72949120015 scopus 로고    scopus 로고
    • Deviceto-device communication as an underlay to LTE-Advanced networks
    • Dec.
    • K. Doppler, M. Rinne, C. Wijting, C. B. Ribeiro, and K. Hugl, "Deviceto-device communication as an underlay to LTE-Advanced networks, " IEEE Communications Magazine, vol. 47, no. 12, pp. 42-49, Dec. 2009.
    • (2009) IEEE Communications Magazine , vol.47 , Issue.12 , pp. 42-49
    • Doppler, K.1    Rinne, M.2    Wijting, C.3    Ribeiro, C.B.4    Hugl, K.5
  • 2
    • 84355161968 scopus 로고    scopus 로고
    • Capacity enhancement using an interference limited area for device-to-device uplink underlaying cellular networks
    • Dec.
    • H. Min, J. Lee, S. Park, and D. Hong, "Capacity enhancement using an interference limited area for device-to-device uplink underlaying cellular networks, " IEEE Transactions on Wireless Communications, vol. 10, no. 12, pp. 3995-4000, Dec. 2011.
    • (2011) IEEE Transactions on Wireless Communications , vol.10 , Issue.12 , pp. 3995-4000
    • Min, H.1    Lee, J.2    Park, S.3    Hong, D.4
  • 3
    • 84860393847 scopus 로고    scopus 로고
    • Resource shaing optimization for device-to-device communication underlaying cellular networks
    • Aug.
    • C.-H. Yu, K. Doppler, C. B. Ribeiro, and O. Tirkkonen, "Resource shaing optimization for device-to-device communication underlaying cellular networks, " IEEE Transactions on Wireless Communications, vol. 10, no. 8, pp. 2752-2763, Aug. 2011.
    • (2011) IEEE Transactions on Wireless Communications , vol.10 , Issue.8 , pp. 2752-2763
    • Yu, C.-H.1    Doppler, K.2    Ribeiro, C.B.3    Tirkkonen, O.4
  • 4
    • 84881590269 scopus 로고    scopus 로고
    • Interference-aware graph based resource sharing for device-to-device communications underlaying cellular networks
    • Shanghai, China, Apr.
    • R. Zhang, X. Cheng, L. Yang, and B. Jiao, "Interference-aware graph based resource sharing for device-to-device communications underlaying cellular networks, " in Proc. IEEE WCNC 2013, Shanghai, China, Apr. 2013.
    • (2013) Proc. IEEE WCNC 2013
    • Zhang, R.1    Cheng, X.2    Yang, L.3    Jiao, B.4
  • 5
    • 84939553981 scopus 로고    scopus 로고
    • Interference graph based resource allocation (InGRA) for D2D communications underlaying cellular networks
    • Aug.
    • R. Zhang, X. Cheng, L. Yang, and B. Jiao, "Interference graph based resource allocation (InGRA) for D2D communications underlaying cellular networks, " IEEE Transactions on Vehicular Technology, vol. 64, no. 8, pp. 3844-3850, Aug. 2015.
    • (2015) IEEE Transactions on Vehicular Technology , vol.64 , Issue.8 , pp. 3844-3850
    • Zhang, R.1    Cheng, X.2    Yang, L.3    Jiao, B.4
  • 7
    • 84923299396 scopus 로고    scopus 로고
    • D2D channel measurements and models: A survey
    • Mar.
    • X. Cheng, Y. Li, B. Ai, X. Yin, and Q. Wang, "D2D channel measurements and models: A survey, " IET Communications, vol. 9, no. 3, pp. 312-325, Mar. 2015.
    • (2015) IET Communications , vol.9 , Issue.3 , pp. 312-325
    • Cheng, X.1    Li, Y.2    Ai, B.3    Yin, X.4    Wang, Q.5
  • 8
    • 84938102289 scopus 로고    scopus 로고
    • D2D for intelligent transportation systems: A feasibility study
    • Aug.
    • X. Cheng, L. Yang, and X. Shen, "D2D for intelligent transportation systems: A feasibility study, " IEEE Transactions on Intelligent Transportation Systems, vol. 16, no. 4, pp. 1784-1793, Aug. 2015.
    • (2015) IEEE Transactions on Intelligent Transportation Systems , vol.16 , Issue.4 , pp. 1784-1793
    • Cheng, X.1    Yang, L.2    Shen, X.3
  • 9
    • 84890430700 scopus 로고    scopus 로고
    • Secrecy-based access control for device-to-device communication underlaying cellular networks
    • Nov.
    • J. Yue, C. Ma, H. Yu, and W. Zhou, "Secrecy-based access control for device-to-device communication underlaying cellular networks, " IEEE Communications Letters, vol. 17, no. 11, pp. 2068-2071, Nov. 2013.
    • (2013) IEEE Communications Letters , vol.17 , Issue.11 , pp. 2068-2071
    • Yue, J.1    Ma, C.2    Yu, H.3    Zhou, W.4
  • 10
    • 84907003865 scopus 로고    scopus 로고
    • Radio resource allocation for physical-layer security in D2D underlay communications
    • Sydney, Australia, Jun.
    • H. Zhang, T. Wang, L. Song, and Z. Han, "Radio resource allocation for physical-layer security in D2D underlay communications, " in Proc. IEEE ICC 2014, Sydney, Australia, Jun. 2014.
    • (2014) Proc. IEEE ICC 2014
    • Zhang, H.1    Wang, T.2    Song, L.3    Han, Z.4
  • 14
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sept.
    • L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy, " IEEE Transactions on Information Theory, vol. 54, no. 9, pp. 4005-4019, Sept. 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    Gamal, H.E.2
  • 15
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays, " IEEE Transactions on Signal Processing, vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Transactions on Signal Processing , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 16
    • 84867799883 scopus 로고    scopus 로고
    • Physical layer security for two-way untrusted relaying with friendly jammers
    • Oct.
    • R. Zhang, L. Song, Z. Han, and B. Jiao, "Physical layer security for two-way untrusted relaying with friendly jammers, " IEEE Transactions on Vehicular Technology, vol. 61, no. 8, pp. 3693-3704, Oct. 2012.
    • (2012) IEEE Transactions on Vehicular Technology , vol.61 , Issue.8 , pp. 3693-3704
    • Zhang, R.1    Song, L.2    Han, Z.3    Jiao, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.