A Survey on Security in D2D Communications
暂无分享,去创建一个
[1] Klaus Doppler,et al. Mode Selection for Device-To-Device Communication Underlaying an LTE-Advanced Network , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[2] Akshai Aggarwal,et al. A key management and secure routing integrated framework for Mobile Ad-hoc Networks , 2013, Ad Hoc Networks.
[3] Zhu Han,et al. Radio resource allocation for physical-layer security in D2D underlay communications , 2014, 2014 IEEE International Conference on Communications (ICC).
[4] Roslan Ismail,et al. Access control and privacy in MANET emergency environment , 2014, 2014 International Conference on Computer and Information Sciences (ICCOINS).
[5] Erik Dahlman,et al. UMTS/IMT-2000 based on wideband CDMA , 1998, IEEE Commun. Mag..
[6] Kyungtae Kang,et al. Secure Device-to-Device Authentication in Mobile Multi-hop Networks , 2014, WASA.
[7] Aiqing Zhang,et al. SeDS: Secure Data Sharing Strategy for D2D Communication in LTE-Advanced Networks , 2016, IEEE Transactions on Vehicular Technology.
[8] Xu Chen,et al. Exploiting Social Ties for Cooperative D2D Communications: A Mobile Social Networking Case , 2015, IEEE/ACM Transactions on Networking.
[9] Zaher Dawy,et al. Social Network Aware Device-to-Device Communication in Wireless Networks , 2015, IEEE Transactions on Wireless Communications.
[10] R. Pushpa Lakshmi,et al. Parallel key management scheme for mobile ad hoc network based on traffic mining , 2015, IET Inf. Secur..
[11] M. Murali,et al. Cached data access in MANET employing AODV protocol , 2015, 2015 International Conference on Computer, Communication and Control (IC4).
[12] Qianbin Chen,et al. A Priority-Based Access Control Model for Device-to-Device Communications Underlaying Cellular Network Using Network Calculus , 2014, WASA.
[13] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[14] Chai-Keong Toh,et al. Ad Hoc Mobile Wireless Networks , 2002 .
[15] Qing Wang,et al. A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.
[16] Raed A. Abd-Alhameed,et al. Secure device-to-device communication in LTE-A , 2014, IEEE Communications Magazine.
[17] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[18] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[19] Junyi Li,et al. Toward proximity-aware internetworking , 2010, IEEE Wireless Communications.
[20] Wenliang Du,et al. Cooperative Key Generation in Wireless Networks , 2012, IEEE Journal on Selected Areas in Communications.
[21] Enrique Festijo,et al. Joint operation of routing control and group key management for 5G ad hoc D2D networks , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).
[22] Lingyang Song,et al. Physical Layer Security in Wireless Communications , 2013 .
[23] Shaojie Tang,et al. KEEP: Fast secret key extraction protocol for D2D communication , 2014, 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS).
[24] Mohsen Guizani,et al. A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.
[25] Yi Sun,et al. Modeling and Analysis on Access Control for Device-to-Device Communications in Cellular Network: A Network-Calculus-Based Approach , 2016, IEEE Transactions on Vehicular Technology.
[26] Sandeep K. S. Gupta,et al. Improving on-demand data access efficiency in MANETs with cooperative caching , 2009, Ad Hoc Networks.
[27] Hao Liang,et al. Device-to-device communication underlaying converged heterogeneous networks , 2014, IEEE Wireless Communications.
[28] 林咨铭,et al. Authentication system for device-to-device communication and authentication method therefore , 2013 .
[29] Stefan Parkvall,et al. Device-to-Device Communications for National Security and Public Safety , 2014, IEEE Access.
[30] Chuan Ma,et al. Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.
[31] Stefania Sesia,et al. LTE - The UMTS Long Term Evolution, Second Edition , 2011 .
[32] Xuemin Shen,et al. Operator controlled device-to-device communications in LTE-advanced networks , 2012, IEEE Wireless Communications.
[33] Zheng Yan,et al. PSNController: An Unwanted Content Control System in Pervasive Social Networking Based on Trust Management , 2015, ACM Trans. Multim. Comput. Commun. Appl..
[34] Gary Steri,et al. Connectivity and security in a D2D communication protocol for public safety applications , 2014, 2014 11th International Symposium on Wireless Communications Systems (ISWCS).
[35] Yu Cheng,et al. Secure key establishment for Device-to-Device communications , 2014, 2014 IEEE Global Communications Conference.
[36] Zheng Yan,et al. Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels , 2017, IEEE Systems Journal.
[37] Mahalingam Ramkumar,et al. An efficient key predistribution scheme for ad hoc network security , 2005, IEEE Journal on Selected Areas in Communications.
[38] Feng Li,et al. A study of stealthy denial-of-service attacks in Wi-Fi direct device-to-device networks , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).
[39] Olav Tirkkonen,et al. Device-to-Device Communication Underlaying Cellular Communications Systems , 2009, Int. J. Commun. Netw. Syst. Sci..
[40] Panagiotis Papadimitratos,et al. Secure data communication in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[41] Jeong Hyun Yi,et al. Identity-Based Access Control for Ad Hoc Groups , 2004, ICISC.
[42] Mauro Conti,et al. Secure Message Delivery Games for Device-to-Device Communications , 2014, GameSec.
[43] P. Khatri,et al. A Survey on Security issues in Mobile ADHOC networks , 2009 .
[44] Sanjay Shakkottai,et al. FlashLinQ: A synchronous distributed scheduler for peer-to-peer ad hoc networks , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[45] Thomas Haug,et al. The GSM System for Mobile Communications , 1992 .
[46] Carl Wijting,et al. Device-to-device communication as an underlay to LTE-advanced networks , 2009, IEEE Communications Magazine.
[47] Hsiao-Hwa Chen,et al. M2M Communications in 3GPP LTE/LTE-A Networks: Architectures, Service Requirements, Challenges, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[48] Wei Xu,et al. Device-to-device communications: The physical layer security advantage , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[49] C.-C. Jay Kuo,et al. Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.
[50] Xu Chen,et al. SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[51] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..