236 Hits in 6.6 sec

Table of contents

2019 IEEE Communications Letters  
Son 875 WIRELESS COMMUNICATION THEORY Resource Allocation and Power Control to Maximize the Overall System Survival Time for Mobile Cells With a D2D Underlay ...........................................  ...  Yang 922 WIRELESS SYSTEMS Analysis and Optimization of Wireless-Powered Cooperative Jamming for Sensor Network Over Nakagami-m Fading Channels ..........................................................  ... 
doi:10.1109/lcomm.2019.2912540 fatcat:27evpoovsnavlli7l423s7ovqm

Game-theoretic Learning Approaches for Secure D2D Communications Against Full-duplex Active Eavesdropper

Yijie Luo, Zhibin Feng, Han Jiang, Yang Yang, Yuzhen Huang, Junnan Yao
2019 IEEE Access  
In this paper, we analyze the anti-eavesdropping and anti-jamming performance of D2D communications with a full-duplex active eavesdropper (FAE).  ...  INDEX TERMS D2D communications, physical layer security, full-duplex active eavesdropper, Q-learning, stochastic learning automata.  ...  GAME THEORY FOR PHYSICAL LAYER SECURITY IN D2D COMMUNICATIONS WITH ACTIVE EAVESDROPPERS Game theory is an efficient mathematical tool, which can model the interaction between multiple players with different  ... 
doi:10.1109/access.2019.2906845 fatcat:imbtpspz65d2pmhzwa2mwtbkoa

An Efficient Game Theory-Based Power Control Algorithm for D2D Communication in 5G Networks

2021 KSII Transactions on Internet and Information Systems  
This leads to reliable connectivity with minimal power consumption in wireless communication. The power control in D2D is modeled as a non-cooperative game.  ...  The system's capacity and energy efficiency through D2D communication have been enhanced by the game theory analysis of non-cooperative power control [11] .  ...  The power control strategy has been proposed to eliminate the interference among D2D links and the cellular system, based on the non-cooperative game theory with the pricing mechanism.  ... 
doi:10.3837/tiis.2021.07.018 fatcat:ne65bow4q5buvf5zfoit3k72ca

Security for 5G Mobile Wireless Networks

Dongfeng Fang, Yi Qian, Rose Qingyang Hu
2018 IEEE Access  
The paper starts with a review on 5G wireless networks particularities as well as on the new requirements and motivations of 5G wireless security.  ...  The potential attacks and security services with the consideration of new service requirements and new use cases in 5G wireless networks are then summarized.  ...  Besides cooperation, power control and channel access are also considered in securing D2D communications.  ... 
doi:10.1109/access.2017.2779146 fatcat:yjroccchnbbzbmmlmug4q7ge4q

Spectrum Sharing for Secrecy Performance Enhancement in D2D-enabled UAV Networks [article]

B. Yang, T. Taleb, Z. Wu, L. Ma
2022 arXiv   pre-print
With the assistance of device-to-device (D2D) communications, unmanned aerial vehicle (UAV) networks are anticipated to support widespread applications in the fifth generation (5G) and beyond wireless  ...  To ensure secure communications of such networks, physical layer security is a promising technique, which utilizes the randomness and noise of wireless channels to enhance secrecy performance.  ...  Cooperative Jamming Cooperative jamming represents a class of typical physical layer security techniques that exploit intended or unintended interference as jamming signal to protect the legitimate transmission  ... 
arXiv:2201.03370v1 fatcat:6jp54xiklbgtrpulcyqfstqrbu

A cross-layer cooperative jamming scheme for social internet of things

Yan Huo, Jingjing Fan, Yingkun Wen, Ruinian Li
2021 Tsinghua Science and Technology  
A typical social IoT is composed of a cellular network with underlaying Device-to-Device (D2D) communications.  ...  To select the optimal D2D gadget as a friendly jammer, we apply Kuhn-Munkres (KM) algorithm to solve the maximization problem of social intimacy and cooperative jamming.  ...  jamming communication is one of the promising technologies to achieve secure interconnection of massive wireless devices in an IoT system.  ... 
doi:10.26599/tst.2020.9010020 fatcat:gert3lyxxzazvjwt6wwa2gias4

Game Theory Based Interference Control and Power Control for D2D Communication in Cellualar Networks

Fa-Bin Li, Peng-Xiang Li, Ya-Fei Yang, Hui Li
2016 International Journal of Computer Networks & Communications  
D2D (Device-to-device) communication technology in a cellular network makes full use of spectrum resources underlaying, reduces the load of the base station, minimizes transmit power of the terminals and  ...  With the current development of mobile communication services, people need personal communication of high speed, excellent service, high quality and low latency,however, limited spectrum resources become  ...  In recent years, game theory has become a tool for the design of wireless communication networks.  ... 
doi:10.5121/ijcnc.2016.8503 fatcat:7yl4nkm6ynegzb7b3ypoghy4si

Surveying pervasive public safety communication technologies in the context of terrorist attacks

Ali Masood, Davide Scazzoli, Navuday Sharma, Yannick Le Moullec, Rizwan Ahmad, Luca Reggiani, Maurizio Magarini, Muhammad Mahtab Alam
2020 Physical Communication  
assisted) and decentralized (without base-station) architectures, multi-hop D2D routing for PSN, and jamming and anti-jamming in mobile networks.  ...  Many researchers have proposed extended coverage approaches [17, 18, 19] to connect the out-of-coverage user equipment (UE) with the nearest base stations using relay communication for the public 3 J o  ...  Game Theory Framework: The work [127] proposes a joint scheduling 775 method, power control, and channel allocation for D2D communication using a game theory approach.  ... 
doi:10.1016/j.phycom.2020.101109 fatcat:s74tzgwo6rfmbjyfqnytrdxece

Table of contents

2016 IEEE Transactions on Communications  
Kennedy 3771 Performance Analysis of Diffusion-Based Molecular Communications With Memory ...... S. Galmés and B.  ...  Heath, Jr. 3981 An Autonomous Learning-Based Algorithm for Joint Channel and Power Level Selection by D2D Pairs in Heterogeneous Cellular Networks ......................................................  ... 
doi:10.1109/tcomm.2016.2603061 fatcat:euu7537pa5b6nlfrw2ttjx343i

Editorial: Wireless Communications and Networks for 5G and Beyond

Trung Q. Duong, Nguyen-Son Vo
2019 Journal on spesial topics in mobile networks and applications  
By employing PNC at the relay with encrypted key, the proposed scheme has been shown to provide a higher security compared to the conventional decode-and-forward and cooperative jamming schemes with respect  ...  In the same research stream of physical layer security, the authors of the second paper study BA Physical Layer Network Coding (PNC) Based Modify-and-Forward with Opportunistic Secure Cooperative Transmission  ...  By employing PNC at the relay with encrypted key, the proposed scheme has been shown to provide a higher security compared to the conventional decode-and-forward and cooperative jamming schemes with respect  ... 
doi:10.1007/s11036-019-01232-8 fatcat:acmfqfwdmnbzxelxxn6m2fnlkq

Stackelberg Game Approaches for Anti-jamming Defence in Wireless Networks [article]

Luliang Jia, Yuhua Xu, Youming Sun, Shuo Feng, Alagan Anpalagan
2018 arXiv   pre-print
Following the advantages of the Stackelberg game model in anti-jamming field, we formulate an anti-jamming decision-making framework based on the Stackelberg game for anti-jamming defence in wireless networks  ...  This article investigates the anti-jamming communications problem in wireless networks from a Stackelberg game perspective.  ...  In [8] , we investigated the anti-jamming power control problem with incomplete information constraints in wireless communications.  ... 
arXiv:1805.12308v1 fatcat:trrf2zkm5neftoi3eh73wygm6e

A Game-Theoretical Modelling Approach for Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access System

Yamen Alsaba, Chee Yen Leow, Sharul Kamal Abdul Rahim
2019 IEEE Access  
In the first phase, the base station provides the helper with power in addition to active users and eavesdropper's information via simultaneous wireless information and power transfer technique.  ...  INDEX TERMS Non-orthogonal multiple access, physical layer security, game theory, Stackelberg game, null-steering beamforming, harvest-and-jam. 5896 2169-3536  ...  Secure device-todevice (D2D) communication is addressed in [27] , where a hybrid base station powers the transmitter in the first phase.  ... 
doi:10.1109/access.2018.2889494 fatcat:c3dekb7vk5ejrdahjohuchhcgi

Guest Editorial Spectrum Sharing and Aggregation for Future Wireless Networks, Part I

Theodoros A. Tsiftsis, Guoru Ding, Yulong Zou, George K. Karagiannidis, Zhu Han, Lajos Hanzo
2016 IEEE Journal on Selected Areas in Communications  
They provided both the Reviewers and Editors with a fascinating snapshot of the range of ongoing research in the area of spectrum sharing and aggregation.  ...  The tenth paper, namely "Hypergraph based wireless distributed storage optimization for cellular D2D underlays," investigates the overall transmission cost minimization problem based on a beneficial content  ...  To address this problem, the authors propose a pair of cooperative game models operating eith with or without transferable utility: for a given network and economic scenario, these models output a cost-partitioning  ... 
doi:10.1109/jsac.2016.2606819 fatcat:ihhh3dafh5bm7nmcla4puptblm

5G device-to-device communication security and multipath routing solutions

Aslihan Celik, Jessica Tetzner, Koushik Sinha, John Matta
2019 Applied Network Science  
Through direct communication, device-to-device (D2D) technology can increase the overall throughput, enhance the coverage, and reduce the power consumption of cellular communications.  ...  This paper presents a survey of the literature on security problems relating to D2D communications in mobile 5G networks.  ...  Game theory can provide insight into anti-jamming algorithms. The situation of jamming, where users want to employ a frequency and jammers want to prevent access, can be viewed as a zero-sum game.  ... 
doi:10.1007/s41109-019-0220-6 fatcat:cmlbcimy5bhs7af46bqaz7g2mm

Review on Radio Resource Allocation Optimization in LTE/LTE-Advanced using Game Theory

Sanaa Oulaourf, Abdelfatteh Haidine, Abdelhak Aqqal, Hassan Ouahmane
2017 International Journal of Communication Networks and Information Security  
This paper presents a survey of the existing game theory based solution for 4G-LTE radio resource allocation problem and its optimization.  ...  Recently, there has been a growing trend toward applying game theory (GT) to various engineering fields in order to solve optimization problems with different competing entities/contributors/players.  ...  for Distributed Wireless Net-work Information Flow Adaptive Re-source Allocation Game Theory Teams Using in Jamming Method and game type Cooperative game, water-filling game, Nash bargain-static game  ... 
dblp:journals/ijcnis/OulaourfHAO17 fatcat:7pu674v2tbh3boigfo2ebbg5ge
« Previous Showing results 1 — 15 out of 236 results