2017
DOI: 10.1007/s11432-017-9160-y
|View full text |Cite
|
Sign up to set email alerts
|

Opportunistic access control for enhancing security in D2D-enabled cellular networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…Next, we firstly design a suboptimal solution to handle the non-convex power optimization problem in (8) with the appropriate relaxation and the SCA algorithm [18]. After converting the optimization problem in (8) to two strictly convex optimization problems, we further present a joint iterative power optimization algorithm for both the cellular user and D2D transmitter node.…”
Section: Joint Power Optimizationmentioning
confidence: 99%
See 1 more Smart Citation
“…Next, we firstly design a suboptimal solution to handle the non-convex power optimization problem in (8) with the appropriate relaxation and the SCA algorithm [18]. After converting the optimization problem in (8) to two strictly convex optimization problems, we further present a joint iterative power optimization algorithm for both the cellular user and D2D transmitter node.…”
Section: Joint Power Optimizationmentioning
confidence: 99%
“…To overcome this issue, physical-layer security (PLS) [4][5][6][7][8][9] has been recently proposed to employ the opening characters of wireless channels to achieve secret communication, resulting in achieving "absolute" security from the concept of information theory. There has been some work to exploit PLS for D2D communications.…”
Section: Introduction and Related Workmentioning
confidence: 99%
“…As another important metric, the widely discussed secrecy throughput presented the average reliable and secure rate during each transmission [8][9][10]. Moreover, signal-processing methods, e.g., beamforming and artificial noise, efficiently enhanced the secrecy performance [11][12][13][14][15][16][17][18]. It was also proposed that diversity technologies had their special functions in PLS, including multi-input multi-output (MIMO) diversity and multi-user diversity [19].…”
Section: Introductionmentioning
confidence: 99%
“…wireless spectrum resources are becoming increasingly scarce. To meet the growing communication demands of customers, the spectral efficiency of the existing wireless networks must be substantially improved [1]- [5]. Meanwhile, the base stations (BSs) under the conventional BS-centric cellular network architecture may often operate at an overloaded status (especially in a rush hour), thus resulting in a severe load imbalance over the network [6].…”
mentioning
confidence: 99%