In this paper, we investigate the physical layer security issue in Device-to-Device (D2D) communications underlaying cellular networks. In order to optimize the system secrecy rate of the cellular secure communication, we derive the optimal joint power control solutions of both the cellular communication links and D2D pairs in terms of the secrecy capacity. Furthermore, we propose a secrecy-based joint power and access control (JPAC) scheme with optimum D2D pair selection mechanism that can achieve an improved network secrecy performance with very low computational complexity. Simulation results validate the efficiency of the proposed secrecy-based JPAC scheme. ? 2016 IEEE.E
Device-to-Device (D2D) communications have been regarded as an advanced technology for the next gene...
peer reviewedNext-generation wireless communication networks demand high spectrum efficiency to serv...
D2D communications is one of the key technologies to enable aggressive spatial frequency reuse in fu...
In this paper, we investigate the physical layer security issue in Device-to-Device (D2D) communicat...
In this paper, we investigate the cooperation issue via spectrum sharing when employing physical lay...
In this paper, we investigate the Physical Layer Security (PLS) of a multiple friendly jammers and m...
In this paper, we propose a novel resource allocation criterion based on physical layer security, wh...
Device-to-Device (D2D) communications have been proposed recently to improve the spectral efficiency...
With development of mobile communication, transmission load of cellular network has greatly increase...
Device-to-device (D2D) communication is introduced in cellular networks to allow devices in close pr...
In systems that allow device-to-device (D2D) communica-tions, user pairs in close proximity communic...
In this paper, we investigate the cooperation issue via spectrum sharing when employing the physical...
Abstract Device-to-device (D2D) communication has been deemed as a promising technology in the next ...
Device-to-device (D2D) communication is considered as one of the key enabling technologies for fifth...
Network-assisted device-to-device (D2D) communication is a next-generation wireless technology enabl...
Device-to-Device (D2D) communications have been regarded as an advanced technology for the next gene...
peer reviewedNext-generation wireless communication networks demand high spectrum efficiency to serv...
D2D communications is one of the key technologies to enable aggressive spatial frequency reuse in fu...
In this paper, we investigate the physical layer security issue in Device-to-Device (D2D) communicat...
In this paper, we investigate the cooperation issue via spectrum sharing when employing physical lay...
In this paper, we investigate the Physical Layer Security (PLS) of a multiple friendly jammers and m...
In this paper, we propose a novel resource allocation criterion based on physical layer security, wh...
Device-to-Device (D2D) communications have been proposed recently to improve the spectral efficiency...
With development of mobile communication, transmission load of cellular network has greatly increase...
Device-to-device (D2D) communication is introduced in cellular networks to allow devices in close pr...
In systems that allow device-to-device (D2D) communica-tions, user pairs in close proximity communic...
In this paper, we investigate the cooperation issue via spectrum sharing when employing the physical...
Abstract Device-to-device (D2D) communication has been deemed as a promising technology in the next ...
Device-to-device (D2D) communication is considered as one of the key enabling technologies for fifth...
Network-assisted device-to-device (D2D) communication is a next-generation wireless technology enabl...
Device-to-Device (D2D) communications have been regarded as an advanced technology for the next gene...
peer reviewedNext-generation wireless communication networks demand high spectrum efficiency to serv...
D2D communications is one of the key technologies to enable aggressive spatial frequency reuse in fu...