• DocumentCode
    700312
  • Title

    Secure communications with D2D cooperation

  • Author

    Ghanem, Samah A. M. ; Ara, Munnujahan

  • Author_Institution
    Mobile Commun. Dept., Eurecom, Sophia Antipolis, France
  • fYear
    2015
  • fDate
    17-19 Feb. 2015
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Device to Device (D2D) communications provides a promising technique for 5G wireless networks, supporting higher data rates. Security of data transmission over wireless clouds could put constraints on devices; whether to cooperate or not. Therefore, our aim is to provide analytical framework for the security at the physical layer and to define the constraints embodied with cooperation in wireless clouds1. In this paper, two legitimate transmitters Alice and John cooperate to increase the reliable transmission rate received by their common legitimate receiver Bob, where one eavesdropper, Eve exists. We propose a distributed algorithm that allows the devices to select whether to cooperate or not and to adapt their optimal power allocation based on the cooperation framework selected. Moreover, we define distance constraints to enforce the benefits of cooperation between devices in a wireless cloud.
  • Keywords
    5G mobile communication; 5G wireless networks; Bob; D2D cooperation; Eve; device to device communications; distance constraints; distributed algorithm; legitimate receiver; wireless clouds; Jamming; Relays; Reliability; Tin;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications, Signal Processing, and their Applications (ICCSPA), 2015 International Conference on
  • Conference_Location
    Sharjah
  • Type

    conf

  • DOI
    10.1109/ICCSPA.2015.7081278
  • Filename
    7081278