An intelligent trust cloud management method for secure clustering in 5G enabled internet of medical things

L Yang, K Yu, SX Yang, C Chakraborty… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
5G edge computing enabled Internet of Medical Things (IoMT) is an efficient technology to
provide decentralized medical services while device-to-device (D2D) communication is a …

Covertness and secrecy study in untrusted relay-assisted D2D networks

R Sun, B Yang, Y Shen, X Jiang… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
This article investigates the covertness and secrecy of wireless communications in an
untrusted relay-assisted device-to-device (D2D) network consisting of a full-duplex base …

Securing large-scale d2d networks using covert communication and friendly jamming

S Feng, X Lu, S Sun, D Niyato… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
We exploit both covert communication and friendly jamming to propose a friendly jamming-
assisted covert communication and use it to doubly secure a large-scale device-to-device …

Resource allocation for uav-assisted wireless powered d2d networks with flying and ground eavesdropping

C Yin, H Yang, P Xiao, Z Chu… - IEEE Communications …, 2023 - ieeexplore.ieee.org
UAV-assisted wireless power transfer D2D networks have great potential to improve
flexibility, spectrum efficiency and lifetime of future wireless networks. We consider an …

Physical-Layer Security of Underlay MIMO-D2D Communications by Null Steering Method Over Nakagami-m and Norton Fading Channels

A Kumar, S Majhi, HC Wu - IEEE Transactions on Wireless …, 2022 - ieeexplore.ieee.org
Underlay device-to-device (D2D) communication network is becoming a promising solution
for the fifth generation (5G) and beyond wireless technology. It exploits the proximity of the …

[HTML][HTML] Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks

Y Triwidyastuti, RHY Perdana, K Shim, B An - Sensors, 2023 - mdpi.com
Multihop transmission is one of the important techniques to overcome the transmission
coverage of each node in wireless sensor networks (WSNs). However, multihop …

Covert d2d communication underlaying cellular network: A system-level security perspective

S Feng, X Lu, K Zhu, D Niyato… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
To meet the surging wireless traffic demand, underlaying cellular networks with device-to-
device (D2D) communication to reuse the cellular spectrum has been envisioned as a …

Optimal D2D power for secure D2D communication with random eavesdropper in 5G‐IoT networks

S Chandra, R Arya, MP Singh - Concurrency and Computation …, 2024 - Wiley Online Library
In the rapidly evolving landscape of fifth generation Internet of Things (5G‐IoT) networks,
Device‐to‐Device (D2D) communication has emerged as a promising paradigm to enhance …

Performance Analysis for Control-and User-Plane Separation based RAN with Non-Uniformly Distributed Users

S Wang, L Zhao, K Liang, G Zheng… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In the control-and user-plane separation (CUPS) based radio access networks (RANs),
control-signaling and data are transmitted by the control base stations (CBSs) and data base …

过时CSI 下全双工中继辅助D2D 网络的物理层安全

沈静洁, 李光球, 罗延翠, 刘会芝 - 电信科学, 2023 - infocomm-journal.com
中继辅助终端直通(device to device, D2D) 网络通过与蜂窝网络共享频谱提高D2D
用户的频谱效率和蜂窝用户(cellular user, CU) 的物理层安全性. 为进一步改善其性能 …