A survey of device-to-device communications: Research issues and challenges

F Jameel, Z Hamid, F Jabeen… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Device-to-Device (D2D) communication has emerged as a promising technology for
optimizing spectral efficiency in future cellular networks. D2D takes advantage of the …

A survey on security aspects for 3GPP 5G networks

J Cao, M Ma, H Li, R Ma, Y Sun, P Yu… - … surveys & tutorials, 2019 - ieeexplore.ieee.org
With the continuous development of mobile communication technologies, Third Generation
Partnership Project (3GPP) has proposed related standards with the fifth generation mobile …

A survey on multiple-antenna techniques for physical layer security

X Chen, DWK Ng, WH Gerstacker… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …

A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

Security and privacy in device-to-device (D2D) communication: A review

M Haus, M Waqas, AY Ding, Y Li… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …

Simultaneous wireless information power transfer for MISO secrecy channel

Z Chu, Z Zhu, M Johnston… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
This paper investigates simultaneous wireless information and power transfer (SWIPT) for a
multiple-input-single-output (MISO) secrecy channel. First, transmit beamforming without …

Device to device communication: A survey

MK Pedhadiya, RK Jha, HG Bhatt - Journal of Network and Computer …, 2019 - Elsevier
With the advanced communication technology, the number of users and applications are
increasing exponentially leading towards the scarcity of resources and an increase in power …

Robust beamforming techniques for non-orthogonal multiple access systems with bounded channel uncertainties

F Alavi, K Cumanan, Z Ding… - IEEE Communications …, 2017 - ieeexplore.ieee.org
We propose a robust beamforming design for non-orthogonal multiple access-based
multiple-input single-output downlink systems. In particular, the robust power minimization …

Two birds with one stone: Towards secure and interference-free D2D transmissions via constellation rotation

L Sun, Q Du, P Ren, Y Wang - IEEE Transactions on Vehicular …, 2015 - ieeexplore.ieee.org
This paper studies the cooperative device-to-device (D2D) transmissions in cellular
networks, where two D2D users communicate bidirectionally with each other and …

Secrecy rate optimization for secure multicast communications

K Cumanan, Z Ding, M Xu… - IEEE Journal of Selected …, 2016 - ieeexplore.ieee.org
Recently, physical layer security has been recognized as a new design paradigm to provide
security in wireless networks. In contrast to the existing conventional cryptographic methods …