|
[1] L. Wang and H. Tang, “Device-to-Device Communications in Cellular Networks,” ser. Springer Briefs in Electrical and Computer Engineering. Springer, 2016. [2] P. Mach, Z. Becvar, and T. Vanek, “In-band device-to-device communication in ofdma cellular networks: A survey and challenges,” IEEE Communications Surveys Tutorials, vol. 17, no. 4, pp. 1885-1922, Fourthquarter 2015. [3] O. N. Hamoud, T. Kenaza, and Y. Challal, “Security in device-to-device communications: a survey,” IET Networks, vol. 7, no. 1, pp. 14-22, 2018. [4] L. Wang, H. Wu, M. Peng, M. Song, and G. Stuber, “Secrecy-oriented resource sharing for cellular device-to-device underlay,” in IEEE Global Commun. Conf. (GLOBECOM), Dec. 2015, pp. 1-5. [5] H. Zhang, T. Wang, L. Song, and Z. Han, “Radio resource allocation for physical-layer security in D2D underlay communications,” in IEEE Int. Conf. on Commun. (ICC), Jun. 2014, pp. 2319-2324. [6] K. Zhang, M. Peng, P. Zhang, and X. Li, “Secrecy-optimized resource allocation for device-to-device communication underlaying heterogeneous networks,” IEEE Transactions on Vehicular Technology, vol. 66, no. 2, pp. 1822-1834, Feb 2017. [7] L. Sun, Q. Du, P. Ren, and Y. Wang, “Two birds with one stone: Towards secure and interference-free D2D transmissions via constellation rotation,” IEEE Trans. Veh. Technol., vol. 65, no. 10, pp. 8767-8774, Oct. 2016. [8] A. Mukherjee and A. L. Swindlehurst, “Detecting passive eavesdroppers in the MIMO wiretap channel," in IEEE Int. Conf. on Acoustics, Speech and Signal Proc. (ICASSP), Mar. 2012, pp. 2809-2812. [9] S. H. Chae, W. Choi, J. H. Lee, and T. Q. S. Quek, “Enhanced secrecy in stochas- tic wireless networks: Artificial noise with secrecy protected zone,” IEEE Trans. Inf. Forensics Security, vol. 9, no. 10, pp. 1617-1628, Oct. 2014. [10] W. Liu, Z. Ding, T. Ratnarajah, and J. Xue, “On ergodic secrecy capacity of random wireless networks with protected zones,” IEEE Trans. Veh. Technol., vol. 65, no. 8, pp. 6146-6158, Aug. 2016. [11] Y. Cai, X. Xu, and W. Yang, “Secure transmission in the random cognitive radio networks with secrecy guard zone and artificial noise," IET Communications, vol. 10, no. 15, pp. 1904-1913, 2016. [12] X. Xu, B. He, W. Yang, X. Zhou, and Y. Cai, “Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers," IEEE Trans. Inf. Forensics Security, vol. 11, no. 2, pp. 373-387, Feb. 2016. [13] X. Xu, W. Yang, Y. Cai, and S. Jin, “On the secure spectral-energy efficiency tradeoff in random cognitive radio networks,” IEEE J. Sel. Areas Commun., vol. 34, no. 10, pp. 2706-2722, Oct. 2016.
|