http://iet.metastore.ingenta.com
1887

## Physical layer security for D2D-enabled cellular networks

• Author(s):
• DOI:

$16.00 (plus tax if applicable) ##### Buy Knowledge Pack 10 chapters for$120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:

Trusted Communications with Physical Layer Security for 5G and Beyond — Recommend this title to your library

## Thank you

Device-to-device (D2D) communication, which enables direct communication between two mobile devices that are in proximity, is regarded as a promising technology for the next generation cellular networks. In this chapter, we focus on the physical layer security issues for D2D-enabled cellular networks. In Section 10.1, we introduce the background of D2D communication, and in Section 10.2, we review the state-of-the-art research on physical layer security for D2D-enabled cellular networks. In Sections 10.3 and 10.4, we study how D2D communication can affect the secrecy performance of cellular communication in small-scale networks and large-scale networks, respectively.

Chapter Contents:

• 10.1 D2D communication in cellular networks
• 10.2 Physical layer security for D2D-enabled cellular networks
• 10.2.1 Securing cellular communication against third-party eavesdroppers
• 10.2.2 Securing cellular communication against D2D-type eavesdroppers
• 10.2.3 Securing D2D communication
• 10.2.4 Securing both cellular and D2D communications
• 10.2.5 Physical layer security in different communication modes
• 10.3 Secure transmission schemes for small-scale D2D-enabled cellular networks
• 10.3.1 System model
• 10.3.2 Optimal D2D link scheduling scheme
• 10.4 Secure transmission schemes for large-scale D2D-enabled cellular networks
• 10.4.1 Network model
• 10.4.2 Secrecy transmission in large-scale D2D-enabled cellular networks
• 10.4.2.1 Connection of cellular links
• 10.4.2.2 Secrecy of cellular links
• 10.4.2.3 Connection of D2D links
• 10.4.2.4 Performance guarantee criteria for cellular transmissions
• 10.4.3 Optimal D2D link scheduling schemes under the strong criterion
• 10.4.3.1 Feasible region of D2D link scheduling parameters
• 10.4.3.2 D2D link scheduling schemes
• 10.4.4 Optimal D2D link scheduling schemes under the weak criterion
• 10.4.4.1 Feasible region of D2D link scheduling parameters
• 10.4.4.2 D2D link scheduling schemes
• 10.5 Summary
• References

Inspec keywords:

Subjects:

Preview this chapter:

Physical layer security for D2D-enabled cellular networks, Page 1 of 2

| /docserver/preview/fulltext/books/te/pbte076e/PBTE076E_ch10-1.gif /docserver/preview/fulltext/books/te/pbte076e/PBTE076E_ch10-2.gif

### Related content

content/books/10.1049/pbte076e_ch10
pub_keyword,iet_inspecKeyword,pub_concept
6
6
This is a required field