2018
DOI: 10.1007/s11277-018-5746-x
|View full text |Cite
|
Sign up to set email alerts
|

Hidden Terminal Aware Clustering for Large-scale D2D Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…In the grouping algorithms of [4][5][6][7][8][9], only the hidden node problem is considered. In our work, the load balance is synchronously considered.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In the grouping algorithms of [4][5][6][7][8][9], only the hidden node problem is considered. In our work, the load balance is synchronously considered.…”
Section: Resultsmentioning
confidence: 99%
“…In [8], the intercluster grouping method is proposed to eliminate the hidden node problem. In [9], the authors propose a hidden terminal aware clustering mechanism, and the clusters are formed based on the detected information of the neighbor learning phase. The grouping access strategy can significantly mitigate the effect of hidden nodes.…”
Section: Introductionmentioning
confidence: 99%
“…The operator is responsible for user identity authentication, access control, connection establishment, resource allocation and security management. V2V communication links share the spectrum resources of normal cellular systems and can be applied to local services, such as local content sharing V2V direct communication is performed between the transmitting and the receiving of the VU, and the CU communication needs to pass through the BS first and then to the receiving end [29]. Eve intercepts the V2V link.…”
Section: A Scene Modelmentioning
confidence: 99%