Results 31 to 40 of about 45,537 (246)

Secure Full-Duplex Device-to-Device Communication [PDF]

open access: yes, 2017
This paper considers full-duplex (FD) device-to-device (D2D) communications in a downlink MISO cellular system in the presence of multiple eavesdroppers.
Khandaker, Muhammad R. A.   +2 more
core   +3 more sources

Energy-efficient Joint Power Allocation and Channel Selection for D2D Communications

open access: yesEAI Endorsed Transactions on Energy Web, 2015
Device-to-device (D2D) communications have gained great attentions due to the potential and numerous benefits for cellular networks. However,it also brings tremendous resource allocation challenges for the sake of the constraint of battery life.
Guifang Ma, Zhenyu Zhou, Jinfang Bai
doaj   +1 more source

Efficient Exploitation of Radio Frequency and Visible Light Communication Bands for D2D in Mobile Networks [PDF]

open access: yes, 2019
The concept of device-to-device (D2D) communication, combining common radio frequency (RF) and visible light communication (VLC), is seen as a feasible way how to cope with spectrum crunch in the RF domain and how to maximize spectral efficiency in ...
Bečvář Z.   +4 more
core   +1 more source

Integration of D2D, Network Slicing, and MEC in 5G Cellular Networks: Survey and Challenges

open access: yesIEEE Access, 2021
With the tremendous demand for connectivity anywhere and anytime, existing network architectures should be modified. To cope with the challenges that arise due to the increasing flood of devices/users and a diverse range of application requirements, new ...
Lubna Nadeem   +6 more
semanticscholar   +1 more source

Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2022
We exploit both covert communication and friendly jamming to propose a friendly jamming-assisted covert communication and use it to doubly secure a large-scale device-to-device (D2D) network against eavesdroppers (i.e., wardens).
Shaohan Feng   +4 more
semanticscholar   +1 more source

A Heuristic D2D Resource Allocation Scheme Based on Proportional Fairness [PDF]

open access: yesJisuanji gongcheng, 2017
Device-to-Device(D2D) communication is an effective technique to solve the shortage of spectrum resources in cellular networks.With the increasing diversification of mobile multi-media services,users need more bandwidth.Aiming at this problem,this paper ...
WANG Juntao,LI Hui,BU Zhiyong
doaj   +1 more source

RIS-Aided Physical Layer Security With Full-Duplex Jamming in Underlay D2D Networks

open access: yesIEEE Access, 2021
This paper investigates the physical layer security and data transmission for the underlay device-to-device (D2D) networks, and considers a combination of the reconfigurable intelligent surface (RIS) and full-duplex (FD) jamming receiver for the ...
Waqas Khalid   +4 more
semanticscholar   +1 more source

Green Cooperative Device–to–Device Communication: a Social–Aware Perspective

open access: yesIEEE Access, 2016
As the mobile operators strive to accommodate the increasing load and capacity requirements, direct communication among users' devices, namely, device-to-device (D2D) communication, emerges as an advantageous solution for cellular traffic offloading ...
Eftychia Datsika   +3 more
doaj   +1 more source

Energy-Efficient Power Allocation and Relay Selection Schemes for Relay-Assisted D2D Communications in 5G Wireless Networks

open access: yesSensors, 2018
Device-to-device (D2D) communications allows user equipment (UE) that are in close proximity to communicate with each other directly without using a base station.
Md Arifur Rahman   +2 more
doaj   +1 more source

Connectivity Times for Mobile D2D Networks [PDF]

open access: yes2018 IEEE International Conference on Communications (ICC), 2018
Connectivity questions for mobile D2D networks are often approached by considering steady state performance metrics. This is due to the difficulty in handling a finite time horizon with random mobility. Hence, in this paper we create a framework to evaluate connectivity time in closed form over a finite time horizon for mobile devices. The basic metric
Smith, P, Coon, J
openaire   +1 more source

Home - About - Disclaimer - Privacy