Secure communications with D2D cooperation

Ghanem, Samah A. M; Ara, Munnujahan
ICCSPA 2015, IEEE International Conference on Communications, Signal Processing and their Applications, February 17-19, 2015, Sharjah, United Arab Emirates

Device to Device (D2D) communication provides a promising technique for 5G wireless networks, supporting higher data rates. Security of data transmission over wireless clouds
could put constraints on devices; whether to cooperate or not. Therefore, our aim is to provide analytical framework for the security at the physical layer and to define the constraints embodied with cooperation in wireless clouds1. In this paper, two legitimate transmitters Alice and John cooperate to increase the reliable transmission rate received by their common legitimate receiver Bob, where one eavesdropper, Eve exists. We propose a distributed algorithm that allows the devices to select whether to
cooperate or not and to adapt their optimal power allocation based on the cooperation framework selected. Moreover, we define distance constraints to enforce the benefits of cooperation between devices in a wireless cloud.

DOI
Type:
Conférence
City:
Sharjah
Date:
2015-02-17
Department:
Systèmes de Communication
Eurecom Ref:
4504
Copyright:
© 2015 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
See also:

PERMALINK : https://www.eurecom.fr/publication/4504