2015 IEEE International Conference on Communication Workshop (ICCW) 2015
DOI: 10.1109/iccw.2015.7247255
|View full text |Cite
|
Sign up to set email alerts
|

Physical layer security for relay assisted MIMO D2D communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 17 publications
0
12
0
Order By: Relevance
“…In this paper [4] authors uses the secure beamforming to prevent hackers on multiple-input multiple-output (MIMO) device-to-device (D2D) communication. The main aim of this method is to minimise mean square error by using the signal to interference plus noise ratio threshold value.…”
Section: Physical Layer Security Solutions For D2dmentioning
confidence: 99%
“…In this paper [4] authors uses the secure beamforming to prevent hackers on multiple-input multiple-output (MIMO) device-to-device (D2D) communication. The main aim of this method is to minimise mean square error by using the signal to interference plus noise ratio threshold value.…”
Section: Physical Layer Security Solutions For D2dmentioning
confidence: 99%
“…Channel State Information (CSI) which refers to known channel properties of a wireless link can serve to extract secret keys from the measurement of the physical layer (Table 3). Recently, various CSI-based key extraction works have been proposed to secure D2D communications [23,32,[48][49][50][51][52][53][54][55][56]. Xi et al [48] proposed a fast secret key extraction protocol for D2D communication (KEEP), in which a validation-recombination mechanism is used to obtain symmetric secret keys from the CSI measurements of all orthogonal frequency division multiple subcarriers.…”
Section: Physical Layermentioning
confidence: 99%
“…In [51], a novel resource allocation based on the physical layer security has been proposed, in which a power and subcarrier allocation scheme maximises the D2D security capacity without influencing the cellular user's basic capacity. Jayasinghe et al have designed a secure beamforming technique to prevent eavesdropping on multiple-input multiple-output D2D communications via a trusted relay which performs physical layer network coding [52].…”
Section: Physical Layermentioning
confidence: 99%
See 1 more Smart Citation
“…PLS for D2D MIMO relaying was examined in [35] with multiple eavesdroppers and imperfect eavesdropper CSI and a random channel estimation error model. The eavesdroppers were assumed to be blind, i.e., having no CSI available and not knowing the transmit beamformers.…”
Section: Introductionmentioning
confidence: 99%