YE Jiang, L Wang, H Zhao,
HH Chen - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
A device-to-device (D2D) communication link is vulnerable because it is relatively easy to be
compromised by adversaries due to the fact that D2D terminals are power limited nodes …