http://iet.metastore.ingenta.com
1887

access icon openaccess Enabling cyber-physical communication in 5G cellular networks: challenges, spatial spectrum sensing, and cyber-security

  • XML
    142.109375Kb
  • HTML
    173.94140625Kb
  • PDF
    377.1220703125Kb
Loading full text...

Full text loading...

/deliver/fulltext/iet-cps/2/1/IET-CPS.2017.0010.html;jsessionid=9ek1kieo6kj06.x-iet-live-01?itemId=%2fcontent%2fjournals%2f10.1049%2fiet-cps.2017.0010&mimeType=html&fmt=ahah

References

    1. 1)
      • 1. Cisco: ‘Fog computing and the internet of things: extend the cloud to where the things are’. Technical report, white paper, Cisco, 2015.
    2. 2)
    3. 3)
    4. 4)
    5. 5)
    6. 6)
    7. 7)
    8. 8)
    9. 9)
      • 9. Mahmood, T., Afzal, U.: ‘Security analytics: big data analytics for cybersecurity: a review of trends, techniques and tools’. 2013 second National Conf. on Information Assurance (NCIA), December 2013, pp. 129134.
    10. 10)
      • 10. 5G RESEARCH IN HORIZON 2020.
    11. 11)
      • 11. Recommendation ITU-R M.2083-0: IMT vision – framework and overall objectives of the future development of IMT for 2020 and beyond’ (International Telecommunication Union, 2015).
    12. 12)
      • 12. Liu, L., Miao, G., Zhang, J.: ‘Energy-efficient scheduling for downlink multi-user MIMO’. 2012 IEEE Int. Conf. on Communications (ICC), June 2012, pp. 43944394.
    13. 13)
    14. 14)
      • 14. Mahmood, F., Perrins, E., Liu, L.: ‘Modeling and analysis of energy consumption for RF transceivers in wireless cellular systems’. 2015 IEEE Global Communications Conf. (GLOBECOM), December 2015, pp. 16.
    15. 15)
    16. 16)
    17. 17)
    18. 18)
    19. 19)
    20. 20)
      • 20. Atat, R., Liu, L., Ashdown, J., et al: ‘On the performance of relay-assisted D2D networks under spatially correlated interference’. 2016 IEEE Global Communications Conf. (GLOBECOM), December 2016, pp. 16.
    21. 21)
      • 21. Atat, R., Liu, L., Mastronarde, N., et al: ‘Energy harvesting-based D2D-assisted machine-type communications’, IEEE Trans. Commun., 2016, PP, (99), pp. 11.
    22. 22)
    23. 23)
      • 23. Zhang, J., Shao, C., Wang, Y., et al: ‘Performance of a two-hop cellular system with different power allocation schemes’. 2004 IEEE 60th Vehicular Technology Conf. (VTC2004-Fall), September 2004, vol. 6, pp. 45384542.
    24. 24)
      • 24. Sreng, V., Yanikomeroglu, H., Falconer, D.: ‘Coverage enhancement through two-hop relaying in cellular radio systems’. 2002 IEEE Wireless Communications and Networking Conf. (WCNC 2002), March 2002, vol. 2, pp. 881885.
    25. 25)
    26. 26)
      • 26. Chen, H., Liu, L., Mastronarde, N., et al: ‘Cooperative retransmission for massive MTC under spatiotemporally correlated interference’. 2016 IEEE Global Communications Conf. (GLOBECOM), December 2016.
    27. 27)
      • 27. Zhou, Y., Zhuang, W.: ‘Opportunistic cooperation in wireless ad hoc networks with interference correlation’, Peer-to-Peer Netw. Appl., 2017, 10, (1), pp. 238252.
    28. 28)
    29. 29)
    30. 30)
    31. 31)
    32. 32)
    33. 33)
      • 33. Wang, M., Yan, Z.: ‘Security in D2D communications: a review’. 2015 IEEE Trustcom/BigDataSE/ISPA, August 2015, vol. 1, pp. 11991204.
    34. 34)
    35. 35)
      • 35. Pospiil, J., Novotný, M.: ‘Evaluating cryptanalytical strength of lightweight cipher present on reconfigurable hardware’. 2012 15th Euromicro Conf. on Digital System Design, September 2012, pp. 560567.
    36. 36)
    37. 37)
      • 37. Canelo, F., Silva, B.M.C., Rodrigues, J.J.P.C., et al: ‘Performance evaluation of an enhanced cryptography solution for m-health applications in cooperative environments’. 2013 IEEE Global Communications Conf. (GLOBECOM), December 2013, pp. 17111716.
    38. 38)
    39. 39)
    40. 40)
    41. 41)
    42. 42)
      • 42. Chen, H., Liu, L.: ‘Resource allocation for sensing-based device-to-device (D2D) networks’. 2015 49th Asilomar Conf. on Signals, Systems and Computers, November 2015, pp. 10581062.
    43. 43)
      • 43. Atat, R., Liu, L.: ‘On the achievable transmission capacity of secrecy-based D2D cellular networks’. IEEE Global Communications Conf. (GLOBECOM), December 2016, pp. 16.
    44. 44)
      • 44. Wang, H., Zhou, X., Reed, M.C.: ‘Physical layer security in cellular networks: a stochastic geometry approach’, IEEE Trans. Commun., 2013, 12, (6), pp. 27762787.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2017.0010
Loading

Related content

content/journals/10.1049/iet-cps.2017.0010
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address