<p>This SpringerBrief focuses on crucial issues for device-to-device (D2D) communications within the rapidly expanding 4G LTE toward 5G system. Several critical technical challenges in D2D communications are discussed, and D2D standardization activities in 3GPP are provided. Topics range from proxim
Security-Aware Device-to-Device Communications Underlaying Cellular Networks
β Scribed by Aiqing Zhang, Liang Zhou, Lei Wang (auth.)
- Publisher
- Springer International Publishing
- Year
- 2016
- Tongue
- English
- Leaves
- 81
- Series
- SpringerBriefs in Electrical and Computer Engineering
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
The objective of this SpringerBrief is to present security architectures and incentive mechanisms to realize system availability for D2D communications. D2D communications enable devices to communicate directly, improving resource utilization, enhancing userβs throughput, extending battery lifetime, etc. However, due to the open nature of D2D communications, there are two substantial technical challenges when applied to large-scale applications, that is, security and availability which is demonstrated in this book.
This SpringerBrief proposes a secure data sharing protocol, which merges the advantages of public key cryptography and symmetric encryption, to achieve data security in D2D communications. Furthermore, a joint framework involving both the physical and application layer security technologies is proposed for multimedia service over D2D communications thus the scalable security service can be achieved without changing the current communication framework. Additionally, as the system availability largely depends on the cooperation degree of the users, a graph-theory based cooperative content dissemination scheme is proposed to achieve maximal Quality of Experience (QoE) with fairness and efficiency.
This SpringerBrief will be a valuable resource for advanced-level students and researchers who want to learn more about cellular networks.
β¦ Table of Contents
Front Matter....Pages i-x
Introduction....Pages 1-14
Secure Data Transmission Protocol....Pages 15-29
Joint PhysicalβApplication Layer Security....Pages 31-49
Cooperation Stimulation....Pages 51-69
Summary....Pages 71-73
β¦ Subjects
Computer Communication Networks; Systems and Data Security; Communications Engineering, Networks
π SIMILAR VOLUMES
<p>This brief examines current research on cooperative device-to-device (D2D) communication as an enhanced offloading technology to improve the performance of cognitive radio cellular networks. By providing an extensive review of recent advances in D2D communication, the authors demonstrate that the
<p>Device-to-Device (D2D) communication will become a key feature supported by next generation cellular networks, a topic of enormous importance to modern communication. Currently, D2D serves as an underlay to the cellular network as a means to increase spectral efficiency. Although D2D communicatio
Covering the fundamental theory together with the state of the art in research and development, this practical guide provides the techniques needed to design, analyze, and optimize device-to-device (D2D) communications in wireless networking. With an ever-increasing demand for higher data rate wirel
Covering the fundamental theory together with the state of the art in research and development, this practical guide provides the techniques needed to design, analyze, and optimize device-to-device (D2D) communications in wireless networking. With an ever-increasing demand for higher data rate wirel
This book aims to fill a growing need in the research community for a reference that describes the state-of-the-art in securing group communications. It focuses on tailoring the security solution to the underlying network architecture (such as the wireless cellular network or the ad hoc/sensor netwo