Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

A survey of device-to-device communications: Research issues and challenges

F Jameel, Z Hamid, F Jabeen… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Device-to-Device (D2D) communication has emerged as a promising technology for
optimizing spectral efficiency in future cellular networks. D2D takes advantage of the …

5G D2D networks: Techniques, challenges, and future prospects

RI Ansari, C Chrysostomou, SA Hassan… - IEEE Systems …, 2017 - ieeexplore.ieee.org
The increasing number of mobile users has given impetus to the demand for high data rate
proximity services. The fifth-generation (5G) wireless systems promise to improve the …

Physical-layer security in the Internet of Things: Sensing and communication confidentiality under resource constraints

A Mukherjee - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
The Internet of Things (IoT) will feature pervasive sensing and control capabilities via a
massive deployment of machine-type communication (MTC) devices. The limited hardware …

Device-to-device communication in cellular networks: A survey

P Gandotra, RK Jha - Journal of Network and Computer Applications, 2016 - Elsevier
A constant need to increase the network capacity for meeting the growing demands of the
subscribers has led to the evolution of cellular communication networks from the first …

Survey on existing authentication issues for cellular-assisted V2X communication

M Muhammad, GA Safdar - Vehicular Communications, 2018 - Elsevier
The integration of Internet of Things (IoT) into cellular network infrastructure is gaining much
attention from the research community and standardisation groups, where new cellular …

A survey on socially aware device-to-device communications

M Ahmed, Y Li, M Waqas, M Sheraz… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Device-to-device (D2D) communication is continuously evolving and engulfing a wide
diversity of proximate services and applications, which is considered as one of the key …

A survey on security in D2D communications

M Wang, Z Yan - Mobile Networks and Applications, 2017 - Springer
Abstract Device-to-Device (D2D) communications have emerged as a promising technology
for the next generation mobile communication networks and wireless systems (5G). As an …

Cooperation via spectrum sharing for physical layer security in device-to-device communications underlaying cellular networks

R Zhang, X Cheng, L Yang - IEEE Transactions on Wireless …, 2016 - ieeexplore.ieee.org
In this paper, we investigate the cooperation issue via spectrum sharing when employing
physical layer security concept into the device-to-device (D2D) communications underlaying …

Downlink resource reuse for device-to-device communications underlaying cellular networks

D Zhu, J Wang, AL Swindlehurst… - IEEE Signal Processing …, 2014 - ieeexplore.ieee.org
The full potential of Device-to-device (D2D) communication relies on efficient resource reuse
strategies including power control and matching of D2D links and cellular users (CUs). This …