http://iet.metastore.ingenta.com
1887

Physical layer security for D2D-enabled cellular networks

Physical layer security for D2D-enabled cellular networks

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Trusted Communications with Physical Layer Security for 5G and Beyond — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Device-to-device (D2D) communication, which enables direct communication between two mobile devices that are in proximity, is regarded as a promising technology for the next generation cellular networks. In this chapter, we focus on the physical layer security issues for D2D-enabled cellular networks. In Section 10.1, we introduce the background of D2D communication, and in Section 10.2, we review the state-of-the-art research on physical layer security for D2D-enabled cellular networks. In Sections 10.3 and 10.4, we study how D2D communication can affect the secrecy performance of cellular communication in small-scale networks and large-scale networks, respectively.

Chapter Contents:

  • 10.1 D2D communication in cellular networks
  • 10.2 Physical layer security for D2D-enabled cellular networks
  • 10.2.1 Securing cellular communication against third-party eavesdroppers
  • 10.2.2 Securing cellular communication against D2D-type eavesdroppers
  • 10.2.3 Securing D2D communication
  • 10.2.4 Securing both cellular and D2D communications
  • 10.2.5 Physical layer security in different communication modes
  • 10.3 Secure transmission schemes for small-scale D2D-enabled cellular networks
  • 10.3.1 System model
  • 10.3.2 Optimal D2D link scheduling scheme
  • 10.4 Secure transmission schemes for large-scale D2D-enabled cellular networks
  • 10.4.1 Network model
  • 10.4.2 Secrecy transmission in large-scale D2D-enabled cellular networks
  • 10.4.2.1 Connection of cellular links
  • 10.4.2.2 Secrecy of cellular links
  • 10.4.2.3 Connection of D2D links
  • 10.4.2.4 Performance guarantee criteria for cellular transmissions
  • 10.4.3 Optimal D2D link scheduling schemes under the strong criterion
  • 10.4.3.1 Feasible region of D2D link scheduling parameters
  • 10.4.3.2 D2D link scheduling schemes
  • 10.4.4 Optimal D2D link scheduling schemes under the weak criterion
  • 10.4.4.1 Feasible region of D2D link scheduling parameters
  • 10.4.4.2 D2D link scheduling schemes
  • 10.5 Summary
  • References

Inspec keywords: cellular radio; telecommunication security; next generation networks

Other keywords: cellular communication; large-scale networks; D2D communication; small-scale networks; secrecy performance; device-to-device communication; next generation cellular networks; mobile devices; D2D-enabled cellular networks; physical layer security

Subjects: Mobile radio systems

Preview this chapter:
Zoom in
Zoomout

Physical layer security for D2D-enabled cellular networks, Page 1 of 2

| /docserver/preview/fulltext/books/te/pbte076e/PBTE076E_ch10-1.gif /docserver/preview/fulltext/books/te/pbte076e/PBTE076E_ch10-2.gif

Related content

content/books/10.1049/pbte076e_ch10
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address