2014
DOI: 10.1109/tcomm.2014.2379633
|View full text |Cite
|
Sign up to set email alerts
|

Interference Exploitation in D2D-enabled Cellular Networks: A Secrecy Perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
82
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 132 publications
(84 citation statements)
references
References 26 publications
2
82
0
Order By: Relevance
“…More particularly, the authors in [13] designed two optimal D2D linkscheduling schemes under different criteria when each base station has a single antenna. When a base station is equipped with multi-antenna, the space redundancy could be exploited to enhance secure communication for the cellular link through some designed schemes, such as the secure beamforming and artificial noise assisted scheme.…”
Section: Introductionmentioning
confidence: 99%
“…More particularly, the authors in [13] designed two optimal D2D linkscheduling schemes under different criteria when each base station has a single antenna. When a base station is equipped with multi-antenna, the space redundancy could be exploited to enhance secure communication for the cellular link through some designed schemes, such as the secure beamforming and artificial noise assisted scheme.…”
Section: Introductionmentioning
confidence: 99%
“…In [16], the cell association and location information of mobile users play an important role in secrecy performance in multi-cell environments. It was shown in [17] that the interference from D2D transmission can enhance physical layer security of cellular communications. In [18], the robust transmitter design via optimization for secure cognitive radio networks was addressed.…”
Section: A Related Workmentioning
confidence: 99%
“…2 plots the power outage probability versus density of PBs with different M . The black, red, and blue curves, representing the CPB, BPB, and NPB policies are obtained from (9), (17), and (27), respectively. Several observations are drawn as follows: 1) the power outage probability significantly decreases with increasing density of PBs, this is because multiuser diversity gain is improved with increasing number of PBs; 2) for small M , there is a gap between BPB and NPB as λ p approaches 10 −1 , however, for large M , they achieve identical performance, the reason is, once again, the effect of small scale fading is averaged out with large M ; and 3) CPB achieves lower power outage probability than BPB and NPB, since it transfers more power from PBs to D2D transmitter.…”
Section: A Network Parametersmentioning
confidence: 99%
“…Consequently, intrinsic physical layer secrecy becomes one of the major research topics in random wireless networks and much work has been done in analysing the secrecy performance. However, we would like to point out that a little attention is paid in evaluating the achievable secrecy capacities from 5G perspective [13]- [15]. Hence, it is imperative to devise general framework to evaluate the secrecy capacity taking the wireless propagation characteristics into account.…”
Section: Introductionmentioning
confidence: 99%
“…However, considering security and privacy issues, the intra-cell interference can be exploited in such a way that the cellular network benefits from it. For instance, the work in [13] exploits interference from D2D transmitters, and [26] assumed the D2D users to play the role of cooperative jammers to improve the secrecy capacity of the cellular network.…”
Section: Introductionmentioning
confidence: 99%