DocumentCode
700312
Title
Secure communications with D2D cooperation
Author
Ghanem, Samah A. M. ; Ara, Munnujahan
Author_Institution
Mobile Commun. Dept., Eurecom, Sophia Antipolis, France
fYear
2015
fDate
17-19 Feb. 2015
Firstpage
1
Lastpage
6
Abstract
Device to Device (D2D) communications provides a promising technique for 5G wireless networks, supporting higher data rates. Security of data transmission over wireless clouds could put constraints on devices; whether to cooperate or not. Therefore, our aim is to provide analytical framework for the security at the physical layer and to define the constraints embodied with cooperation in wireless clouds1. In this paper, two legitimate transmitters Alice and John cooperate to increase the reliable transmission rate received by their common legitimate receiver Bob, where one eavesdropper, Eve exists. We propose a distributed algorithm that allows the devices to select whether to cooperate or not and to adapt their optimal power allocation based on the cooperation framework selected. Moreover, we define distance constraints to enforce the benefits of cooperation between devices in a wireless cloud.
Keywords
5G mobile communication; 5G wireless networks; Bob; D2D cooperation; Eve; device to device communications; distance constraints; distributed algorithm; legitimate receiver; wireless clouds; Jamming; Relays; Reliability; Tin;
fLanguage
English
Publisher
ieee
Conference_Titel
Communications, Signal Processing, and their Applications (ICCSPA), 2015 International Conference on
Conference_Location
Sharjah
Type
conf
DOI
10.1109/ICCSPA.2015.7081278
Filename
7081278
Link To Document