Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon openaccess Enabling cyber-physical communication in 5G cellular networks: challenges, spatial spectrum sensing, and cyber-security

Loading full text...

Full text loading...

/deliver/fulltext/iet-cps/2/1/IET-CPS.2017.0010.html;jsessionid=53kh2lqh3wkfc.x-iet-live-01?itemId=%2fcontent%2fjournals%2f10.1049%2fiet-cps.2017.0010&mimeType=html&fmt=ahah

References

    1. 1)
    2. 2)
      • 42. Chen, H., Liu, L.: ‘Resource allocation for sensing-based device-to-device (D2D) networks’. 2015 49th Asilomar Conf. on Signals, Systems and Computers, November 2015, pp. 10581062.
    3. 3)
    4. 4)
    5. 5)
    6. 6)
      • 20. Atat, R., Liu, L., Ashdown, J., et al: ‘On the performance of relay-assisted D2D networks under spatially correlated interference’. 2016 IEEE Global Communications Conf. (GLOBECOM), December 2016, pp. 16.
    7. 7)
      • 9. Mahmood, T., Afzal, U.: ‘Security analytics: big data analytics for cybersecurity: a review of trends, techniques and tools’. 2013 second National Conf. on Information Assurance (NCIA), December 2013, pp. 129134.
    8. 8)
    9. 9)
    10. 10)
    11. 11)
      • 12. Liu, L., Miao, G., Zhang, J.: ‘Energy-efficient scheduling for downlink multi-user MIMO’. 2012 IEEE Int. Conf. on Communications (ICC), June 2012, pp. 43944394.
    12. 12)
      • 24. Sreng, V., Yanikomeroglu, H., Falconer, D.: ‘Coverage enhancement through two-hop relaying in cellular radio systems’. 2002 IEEE Wireless Communications and Networking Conf. (WCNC 2002), March 2002, vol. 2, pp. 881885.
    13. 13)
      • 44. Wang, H., Zhou, X., Reed, M.C.: ‘Physical layer security in cellular networks: a stochastic geometry approach’, IEEE Trans. Commun., 2013, 12, (6), pp. 27762787.
    14. 14)
      • 26. Chen, H., Liu, L., Mastronarde, N., et al: ‘Cooperative retransmission for massive MTC under spatiotemporally correlated interference’. 2016 IEEE Global Communications Conf. (GLOBECOM), December 2016.
    15. 15)
    16. 16)
    17. 17)
      • 14. Mahmood, F., Perrins, E., Liu, L.: ‘Modeling and analysis of energy consumption for RF transceivers in wireless cellular systems’. 2015 IEEE Global Communications Conf. (GLOBECOM), December 2015, pp. 16.
    18. 18)
    19. 19)
      • 23. Zhang, J., Shao, C., Wang, Y., et al: ‘Performance of a two-hop cellular system with different power allocation schemes’. 2004 IEEE 60th Vehicular Technology Conf. (VTC2004-Fall), September 2004, vol. 6, pp. 45384542.
    20. 20)
      • 33. Wang, M., Yan, Z.: ‘Security in D2D communications: a review’. 2015 IEEE Trustcom/BigDataSE/ISPA, August 2015, vol. 1, pp. 11991204.
    21. 21)
    22. 22)
      • 1. Cisco: ‘Fog computing and the internet of things: extend the cloud to where the things are’. Technical report, white paper, Cisco, 2015.
    23. 23)
    24. 24)
      • 21. Atat, R., Liu, L., Mastronarde, N., et al: ‘Energy harvesting-based D2D-assisted machine-type communications’, IEEE Trans. Commun., 2016, PP, (99), pp. 11.
    25. 25)
    26. 26)
    27. 27)
    28. 28)
    29. 29)
    30. 30)
    31. 31)
      • 35. Pospiil, J., Novotný, M.: ‘Evaluating cryptanalytical strength of lightweight cipher present on reconfigurable hardware’. 2012 15th Euromicro Conf. on Digital System Design, September 2012, pp. 560567.
    32. 32)
      • 37. Canelo, F., Silva, B.M.C., Rodrigues, J.J.P.C., et al: ‘Performance evaluation of an enhanced cryptography solution for m-health applications in cooperative environments’. 2013 IEEE Global Communications Conf. (GLOBECOM), December 2013, pp. 17111716.
    33. 33)
      • 43. Atat, R., Liu, L.: ‘On the achievable transmission capacity of secrecy-based D2D cellular networks’. IEEE Global Communications Conf. (GLOBECOM), December 2016, pp. 16.
    34. 34)
    35. 35)
    36. 36)
    37. 37)
    38. 38)
      • 11. Recommendation ITU-R M.2083-0: IMT vision – framework and overall objectives of the future development of IMT for 2020 and beyond’ (International Telecommunication Union, 2015).
    39. 39)
    40. 40)
    41. 41)
    42. 42)
      • 10. 5G RESEARCH IN HORIZON 2020.
    43. 43)
    44. 44)
      • 27. Zhou, Y., Zhuang, W.: ‘Opportunistic cooperation in wireless ad hoc networks with interference correlation’, Peer-to-Peer Netw. Appl., 2017, 10, (1), pp. 238252.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2017.0010
Loading

Related content

content/journals/10.1049/iet-cps.2017.0010
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address