2016
DOI: 10.1109/lcomm.2016.2552171
|View full text |Cite
|
Sign up to set email alerts
|

Analytical Modeling of Mode Selection for Moving D2D-Enabled Cellular Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
28
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 36 publications
(31 citation statements)
references
References 6 publications
1
28
0
Order By: Relevance
“…As the underlay to the upcoming 5G networks, the development of D2D communication has attracted a lot of attention from both academia and industry. Major research regarding radio resource allocation [5], mode selection [1] and interference management [2] have been widely studied, while only a few works have been done emphasizing on the security and privacy protection for D2D communication in both the academic and standardization communities. In 2014, a detailed survey emphasizing on the D2D infrastructure, the major threads and security requirements [3] is presented by Alam et al After that, Yue et al initially illustrated the D2D communication into information-theoretic secrecy problem of cellular communication, where the secrecy outage probability is utilized to depict the uncertainty of the eavesdropper [18].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…As the underlay to the upcoming 5G networks, the development of D2D communication has attracted a lot of attention from both academia and industry. Major research regarding radio resource allocation [5], mode selection [1] and interference management [2] have been widely studied, while only a few works have been done emphasizing on the security and privacy protection for D2D communication in both the academic and standardization communities. In 2014, a detailed survey emphasizing on the D2D infrastructure, the major threads and security requirements [3] is presented by Alam et al After that, Yue et al initially illustrated the D2D communication into information-theoretic secrecy problem of cellular communication, where the secrecy outage probability is utilized to depict the uncertainty of the eavesdropper [18].…”
Section: Related Workmentioning
confidence: 99%
“…Device-to-Device (D2D) communication is defined as a promising short-distance communicating strategy, which is capable of directly conducting effective data exchange among the proximate entities without involvement of the cellular core network. As for conventional cellular networking services, connectivity between the mobile devices is subjected to the coverage of access point or base stations, where direct communication among mobile devices is not offered [1]. Instead, all the involved traffic floods should be processed through the core cellular network, which severely restrains the large-scale implementation of massive and reliable data exchange between mobile devices.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For the different scenarios, the mode selection method is considering the RSSs of the D2D and aerial links. The measurement results of RSS are usually averaged with filtering the received signal out through Layer-1 and Layer-3 [7]. Therefore, only the distance based path-loss is considered in RSS modeling [7].…”
Section: Proposed Schemes Descriptionmentioning
confidence: 99%
“…The measurement results of RSS are usually averaged with filtering the received signal out through Layer-1 and Layer-3 [7]. Therefore, only the distance based path-loss is considered in RSS modeling [7]. According to the power law, the RSSs for the D2D link, the DL, and the UL are presented as follows…”
Section: Proposed Schemes Descriptionmentioning
confidence: 99%