期刊文献+
共找到53篇文章
< 1 2 3 >
每页显示 20 50 100
Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home
1
作者 Bello Musa Yakubu Majid Iqbal Khan +2 位作者 Abid Khan Farhana Jabeen Gwanggil Jeon 《Digital Communications and Networks》 SCIE CSCD 2023年第2期383-392,共10页
Smart home devices are vulnerable to a variety of attacks.The matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,S... Smart home devices are vulnerable to a variety of attacks.The matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,Smart home).To handle these attacks,most studies have hitherto proposed authentication protocols that cannot necessarily be implemented in devices,especially during Device-to-Device(D2D)interactions.Tapping into the potential of Ethereum blockchain and smart contracts,this work proposes a lightweight authentication mechanism that enables safe D2D interactions in a smart home.The Ethereum blockchain enables the implementation of a decentralized prototype as well as a peer-to-peer distributed ledger system.The work also uses a single server queuing system model and the authentication mechanism to curtail DDoS attacks by controlling the number of service requests in the system.The simulation was conducted twenty times,each with varying number of devices chosen at random(ranging from 1 to 30).Each requester device sends an arbitrary request with a unique resource requirement at a time.This is done to measure the system's consistency across a variety of device capabilities.The experimental results show that the proposed protocol not only prevents colluding attacks,but also outperforms the benchmark protocols in terms of computational cost,message processing,and response times. 展开更多
关键词 DDoS attack device-to-device Smart homes Blockchain AUTHENTICATION Ethereum smartcontract
下载PDF
在LTE-Advanced网络下的Device-to-Device通信 被引量:25
2
作者 王彬 陈力 +1 位作者 张欣 杨大成 《现代电信科技》 2010年第7期24-27,共4页
Device-to-Device(D2D)通信是一种在系统的控制下,允许终端之间通过复用小区资源直接进行通信的新型技术,它能够增加蜂窝通信系统频谱效率,降低终端发射功率,在一定程度上解决无线通信系统频谱资源匮乏的问题。与其他应用于非许可频段... Device-to-Device(D2D)通信是一种在系统的控制下,允许终端之间通过复用小区资源直接进行通信的新型技术,它能够增加蜂窝通信系统频谱效率,降低终端发射功率,在一定程度上解决无线通信系统频谱资源匮乏的问题。与其他应用于非许可频段的同类技术相比,D2D具有干扰可控等优点。文章对D2D技术原理进行了介绍,阐述了它应用的必要性和应用场景、它对比同类技术的优点,以及在应用中的关键问题。 展开更多
关键词 device-to-device(D2D) 频谱效率 LTE-ADVANCED
下载PDF
基于SIR的Device-to-Device移动社交网络信息传播模型 被引量:1
3
作者 张霄宏 钱凯 鲍亚雷 《河南理工大学学报(自然科学版)》 CAS 北大核心 2019年第3期131-136,共6页
智能移动设备的迅速普及在加快移动社交网络发展的同时,也给底层通信网络带来了沉重的负担。为了缓解底层通信网络的负担,越来越多的社交网络应用开始采用Device-to-Device技术传播信息。本文以Device-to-Device移动社交网络为研究对象... 智能移动设备的迅速普及在加快移动社交网络发展的同时,也给底层通信网络带来了沉重的负担。为了缓解底层通信网络的负担,越来越多的社交网络应用开始采用Device-to-Device技术传播信息。本文以Device-to-Device移动社交网络为研究对象,首先分析该网络中用户参与信息传播的特点,然后在传染病模型的基础上构建适合此网络特点的信息传播模型,并利用该模型分析真实Device-to-Device环境中的信息传播过程。结果表明,Device-to-Device移动社交网络中的信息传播与基于Internet的社交网络中的信息传播有相似之处;但是,由于Device-to-Device移动社交网络存在较大的传播时延,信息在该网络中需要较长的时间才能达到传播高峰。 展开更多
关键词 信息传播 社交网络 device-to-device通讯 传染病模型
下载PDF
一种Device-to-Device移动社交网络中的热点文件预测方法 被引量:1
4
作者 张霄宏 侯海杰 任建吉 《小型微型计算机系统》 CSCD 北大核心 2018年第5期973-977,共5页
随着信息技术的蓬勃发展,移动社交网络越来越受到人们的关注,尤其是对移动社交网络中的热点分析.以基于Device-to-Device技术构建的移动社交网络为研究对象,从网络规模、文件分享特征以及用户影响力等方面入手,提出一种预测该类社交网... 随着信息技术的蓬勃发展,移动社交网络越来越受到人们的关注,尤其是对移动社交网络中的热点分析.以基于Device-to-Device技术构建的移动社交网络为研究对象,从网络规模、文件分享特征以及用户影响力等方面入手,提出一种预测该类社交网络中热点文件的方法.该方法从信息和用户的角度出发,通过量化文件重要性、文件敏感性、用户参与力和用户影响力四个指标,利用多元线性回归方法建立预测模型,并在真实数据上验证了方法的有效性. 展开更多
关键词 移动社交网络 device-to-device 热点文件预测
下载PDF
Device-to-Device通信的无线资源管理研究 被引量:1
5
作者 荣涛 《现代电信科技》 2012年第5期6-10,共5页
在IMT-Advanced蜂窝网络中部署设备至设备(D2D:Device-to-Device)通信是当前无线领域内的一个研究热点,其主要的困难在于控制D2D与蜂窝系统间的干扰。D2D的无线资源管理机制和算法是实现系统间干扰协调的关键因素之一。文章从功率控制... 在IMT-Advanced蜂窝网络中部署设备至设备(D2D:Device-to-Device)通信是当前无线领域内的一个研究热点,其主要的困难在于控制D2D与蜂窝系统间的干扰。D2D的无线资源管理机制和算法是实现系统间干扰协调的关键因素之一。文章从功率控制、资源调度和模式选择3个方面,介绍了D2D无线资源管理研究领域的最新成果和进展,并对未来发展方向进行了分析展望。 展开更多
关键词 device-to-device 无线资源管理 干扰协调
下载PDF
Device-to-Device Communication Underlaying Cellular Communications Systems 被引量:13
6
作者 Pekka JANIS Chia-Hao YU +5 位作者 Klaus DOPPLER Cassio RIBEIRO Carl WIJTING Klaus HUGL Olav TIRKKONEN Visa KOIVUNEN 《International Journal of Communications, Network and System Sciences》 2009年第3期169-178,共10页
In this article we propose to facilitate local peer-to-peer communication by a Device-to-Device (D2D) radio that operates as an underlay network to an IMT-Advanced cellular network. It is expected that local services ... In this article we propose to facilitate local peer-to-peer communication by a Device-to-Device (D2D) radio that operates as an underlay network to an IMT-Advanced cellular network. It is expected that local services may utilize mobile peer-to-peer communication instead of central server based communication for rich mul-timedia services. The main challenge of the underlay radio in a multi-cell environment is to limit the inter-ference to the cellular network while achieving a reasonable link budget for the D2D radio. We propose a novel power control mechanism for D2D connections that share cellular uplink resources. The mechanism limits the maximum D2D transmit power utilizing cellular power control information of the devices in D2D communication. Thereby it enables underlaying D2D communication even in interference-limited networks with full load and without degrading the performance of the cellular network. Secondly, we study a single cell scenario consisting of a device communicating with the base station and two devices that communicate with each other. The results demonstrate that the D2D radio, sharing the same resources as the cellular net-work, can provide higher capacity (sum rate) compared to pure cellular communication where all the data is transmitted through the base station. 展开更多
关键词 PEER-TO-PEER device-to-device POWER CONTROL CELLULAR Systems IMT-ADVANCED
下载PDF
A Review in the Core Technologies of 5G: Device-to-Device Communication, Multi-Access Edge Computing and Network Function Virtualization 被引量:2
7
作者 Ruixuan Tu Ruxun Xiang +1 位作者 Yang Xu Yihan Mei 《International Journal of Communications, Network and System Sciences》 2019年第9期125-150,共26页
5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and ... 5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances. 展开更多
关键词 5th Generation Network VIRTUALIZATION device-to-device COMMUNICATION Base STATION Direct COMMUNICATION INTERFERENCE Multi-Access EDGE COMPUTING Mobile EDGE COMPUTING
下载PDF
A New TDD Scheme and Interference-Aware Precoding for Device-to-Device Underlay Massive MIMO 被引量:1
8
作者 Xinxin Liu Xueru Li +2 位作者 Yunzhou Li Ming Zhao Jing Wang 《China Communications》 SCIE CSCD 2016年第S2期100-108,共9页
In device-to-device(D2D)underlay cellular networks with downlink spectrum sharing,massive MIMO seems promising as the large number of antennas at the base station(BS) can be utilized to suppress interference.However,t... In device-to-device(D2D)underlay cellular networks with downlink spectrum sharing,massive MIMO seems promising as the large number of antennas at the base station(BS) can be utilized to suppress interference.However,the channel state information(CSI) from the BS to D2D receivers is required to obtain this advantage.In this paper,we first propose a novel time division duplex(TDD) scheme for D2D users to acquire this CSI,without additional pilot overhead.Moreover,we propose an interference-aware MMSE precoder utilizing the acquired CSI from the BS to not only cellular users but also D2D users to suppress the cellular-to-D2D interference.Simulation results show that our proposed TDD scheme and precoder can significantly improve the achievable sum spectral efficiency(SE) and D2D SE,compared to the classical MMSE precoder.Compared with the interferenceaware ZF precoder,whose performance severely degrades for large user numbers,our proposed interference-aware MMSE precoder can always guarantees a high and stable performance in terms of achievable SE. 展开更多
关键词 device-to-device massive MIMO TDD scheme PRECODING
下载PDF
Resource Allocation and Beamforming Algorithm Based on Interference Avoidance Approach for Device-to-Device Communication Underlaying LTE Cellular Network 被引量:2
9
作者 Huy-Dung Han Chenxi Zhu +1 位作者 Dorin Viorel Akira Ito 《Communications and Network》 2013年第3期367-373,共7页
In this work, we consider device-to-device (D2D) direct communication underlaying a 3GPP LTE-A network. D2D communication enables new service opportunities, provides high throughput and reliable communication while re... In this work, we consider device-to-device (D2D) direct communication underlaying a 3GPP LTE-A network. D2D communication enables new service opportunities, provides high throughput and reliable communication while reducing the base station load. For better total performance, D2D links and cellular links share the same radio resource and the management of interference becomes a crucial task. We propose a radio resource allocation for D2D links based on interference avoidance approach. For system with multiple transmit antennas, we apply beamforming technique based on signal to leakage criterion to reduce the co-channel interference. The results show that, D2D transmission with the resource allocation and beamforming technique provides significant gain compared to that of the regular cellular network. 展开更多
关键词 device-to-device LTE RESOURCE ALLOCATION BEAMFORMING
下载PDF
Adaptive Delay Optimization of Multicast-Enabled Coded Caching in Device-to-Device Networks 被引量:1
10
作者 Liang Zhong Xueqian Zheng +2 位作者 Jie Lin Yang Cao Shenggen Ju 《China Communications》 SCIE CSCD 2020年第1期42-48,共7页
This letter investigates a delay optimization problem in device-to-device(D2D)networks where users have pre-downloaded subfiles following a coded caching rule.Due to acquiring rest subfiles,users may suffer both recei... This letter investigates a delay optimization problem in device-to-device(D2D)networks where users have pre-downloaded subfiles following a coded caching rule.Due to acquiring rest subfiles,users may suffer both receiving and transmitting delays.To achieve the delay minimization,we first propose a delay-aware mode-selection strategy to adaptively choose multicast or D2D communications mode to reduce the receiving-caused delay.By matching these transmit modes with distinct subfile sizes,we further formulate a min-max optimization problem to minimize the delivery delay.Finally,numerical results prove that the proposed scheme outperforms existing ones in terms of both receiving and transmitting delays. 展开更多
关键词 coded caching delay optimization MULTICAST device-to-device
下载PDF
Resource Allocation Method of Device-to-Device Communication 被引量:1
11
作者 Wenji Feng Yafeng Wang Lei Yang 《Communications and Network》 2013年第3期338-343,共6页
In this paper, we study D2D (Device-to-Device) communication underlying LTE-Advanced uplink system. Since D2D communication reuses uplink resources with cellular communication in this scenario, it’s hard to avoid the... In this paper, we study D2D (Device-to-Device) communication underlying LTE-Advanced uplink system. Since D2D communication reuses uplink resources with cellular communication in this scenario, it’s hard to avoid the inference between D2D users and cellular users. If there is no restriction for D2D communication on using the whole uplink frequency band, it will have a strong negative impact on cellular communication. In order to overcome this shortage, we propose a resource allocation method that D2D users and cellular users use orthogonal frequency resources. This method will effectively reduce the inference between both kinds of communication. However, an obvious disadvantage of this method is no effective use of uplink resources. Based on this, we propose an optimized resource allocation method that a specific cellular user will be chosen to reuse the RBs (Resource Block) of D2D users. These ideas will be taken into system-level simulation, and from the results of simulation we can see that the optimized method has the ability to improve overall system performance and limit inference for cell-edge users. 展开更多
关键词 device-to-device COMMUNICATION LTE-ADVANCED System RESOURCE ALLOCATION Method up LINK Cell-edge USERS
下载PDF
Complexity Effective Frequency and Sidelink Synchronization Algorithm for LTE Device-to-Device Communication Systems
12
作者 Yong-An Jung Min-Goo Kang Young-Hwan You 《Computers, Materials & Continua》 SCIE EI 2020年第1期443-458,共16页
Device-to-device(D2D)communication is considered as a major challenge in the long term evolution(LTE)network wherein devices directly communicate with each other.One of the key challenges in D2D sidelink is reliable a... Device-to-device(D2D)communication is considered as a major challenge in the long term evolution(LTE)network wherein devices directly communicate with each other.One of the key challenges in D2D sidelink is reliable and reduced-complexity synchronization.To address this issue,a computationally efficient sequential detection scheme for integer carrier frequency offset and sidelink identity is proposed in the LTE-D2D system.To perform the frequency offset detection without retrieving the sidelink identity,the conjugate relation between two primary sidelink synchronization sequences is exploited,which facilitates the detection tasks of frequency offset and sidelink identity to be decoupled.It is demonstrated from simulation results that the inherent property of the sidelink synchronization sequences is effectively used for joint detection of frequency offset and sidelink identity with significantly reduced complexity,compared to existing estimation schemes. 展开更多
关键词 Long term evolution device-to-device communication carrier frequency offset sidelink identity sidelink synchronization
下载PDF
Cache Hit Ratio Maximization in Device-to-Device Communications Overlaying Cellular Networks
13
作者 Liang Zhong Xueqian Zheng +2 位作者 Yong Liu Mengting Wang Yang Cao 《China Communications》 SCIE CSCD 2020年第2期232-238,共7页
This paper investigates the content placement problem to maximize the cache hit ratio in device-to-device(D2D)communications overlaying cellular networks.We consider offloading contents by users themselves,D2D communi... This paper investigates the content placement problem to maximize the cache hit ratio in device-to-device(D2D)communications overlaying cellular networks.We consider offloading contents by users themselves,D2D communications and multicast,and we analyze the relationship between these offloading methods and the cache hit ratio.Based on this relationship,we formulate the content placement optimization as a cache hit ratio maximization problem,and propose a heuristic algorithm to solve it.Numerical results demonstrate that the proposed scheme can outperform existing schemes in terms of the cache hit ratio. 展开更多
关键词 Cache hit ratio content placement device-to-device MULTICAST
下载PDF
Device-to-Device Based Cooperative Relaying for 5G Network:A Comparative Review
14
作者 JIANG Wei 《ZTE Communications》 2017年第B06期60-66,共7页
Due to the proliferation of mobile internet access, the cellu-lar traffic is envisaged to experience a 1000-fold growth inthe second decade of the 21 st century. To meet such a hugetraffic demand, the Fifth Generation... Due to the proliferation of mobile internet access, the cellu-lar traffic is envisaged to experience a 1000-fold growth inthe second decade of the 21 st century. To meet such a hugetraffic demand, the Fifth Generation(5G) network have toadopt new techniques to substantially increase spectral effi-ciency and reliability. At the base station side, available re-sources(power supply, equipment size, processing capability,etc.) are far more sufficient than that of the terminal side,which imposes a high challenge on the uplink transmission.The concept of cooperative communications opens a possibili-ty of using multiple terminals to cooperatively achieve spa-tial diversity that is typically obtained by means of multipleantennas in the base station. The application of Device-to-Device(D2D) communications in the 3GPP LTE system fur-ther pushes the collaboration of terminals from the theory tothe practice. The utilization of D2D-based cooperative relay-ing is promising in the era of 5G. In this paper, we compara-tively study several cooperative multi-relay schemes, includ-ing the proposed opportunistic space-time coding, in thepresence of imperfect channel state information. The numeri-cal results reveal that the proposed scheme is the best coop-erative solution until now from the perspective of multiplex-ing-diversity tradeoff. 展开更多
关键词 cooperative communications device-to-device(D2D) Distributed Space-Time Coding(DSTC) outdated chanel stateinformation opportunistic relaying
下载PDF
Outage Probability Based on Relay Selection Method for Multi-Hop Device-to-Device Communication
15
作者 海涵 钱鸿志 +1 位作者 冯泓崭 郁进明 《Journal of Donghua University(English Edition)》 CAS 2021年第3期214-220,共7页
To improve the connectivity of device-to-device(D2D)communication between delay-assisted vehicles,a multi-hop D2D relay selection strategy based on outage probability is proposed.The algorithm firstly clusters the rel... To improve the connectivity of device-to-device(D2D)communication between delay-assisted vehicles,a multi-hop D2D relay selection strategy based on outage probability is proposed.The algorithm firstly clusters the relay users based on the distance of D2D users,and determines the number of one-hop relay nodes through the outage probability threshold.Two-hop relay nodes directly select the same number of relays as one-hop relay nodes according to the descending order of signal noise ratio(SNR)to establish a square matrix.The Hungarian algorithm is used to assign the relay nodes of two clusters to complete the inter relay communication.Finally,the information is sent to the D2D receiver by combining technology.The simulation results show that this algorithm can reduce the cost of relay probing process and the outage probability of system in multi-hop D2D relay communication. 展开更多
关键词 multi-hop device-to-device(D2D) vehicle communication relay selection Hungarian algorithm
下载PDF
Distributed Intelligent Reflecting Surfaces-Aided Device-to-Device Communications System 被引量:1
16
作者 Chiya Zhang Wenyu Chen +1 位作者 Qian Chen Chunlong He 《Journal of Communications and Information Networks》 CSCD 2021年第3期197-207,共11页
Intelligent reflecting surface(IRS)is a revolutionizing and promising technology to improve the high transmission rate of the wireless communication systems.Specifically,an IRS consists of a great amount of low-cost p... Intelligent reflecting surface(IRS)is a revolutionizing and promising technology to improve the high transmission rate of the wireless communication systems.Specifically,an IRS consists of a great amount of low-cost passive reflecting elements,which reflect the incident signals to the desired user by collaboratively using passive beamforming.This paper introduces IRSs into a device-to-device(D2D)underlying cellular system to enhance transmission rate performance of the D2D pairs.We formulate an optimization problem of maximizing the transmission rate of the D2D pairs while satisfying the minimum required rate of the cellular users.We address this problem by jointly optimizing the reuse indicator,received beamforming,power allocation,and phase shift matrices.Block coordinate descent(BCD)algorithm is adopted to decouple the original problem into four subproblems.Closed form solutions are obtained by solving the sub-problems of optimizing the received beamforming and power allocation.Then,Kuhn-Munkres(KM)algorithm and minimization-majorization(MM)algorithm are adopted to solve the sub-problems of optimizing the reuse indicator and phase shift matrices,respectively.Simulation results demonstrate that IRSs can effectively improve the transmission rate of the D2D pairs and our proposed distributed IRSs scheme outperforms the other benchmark schemes. 展开更多
关键词 intelligent reflecting surface device-to-device communications block coordinate descent
原文传递
Efficient detection methods for amplify-and-forward relay-aided device-to-device systems with full-rate space-time block code
17
作者 Kang-li ZHANG Cong ZHANG +1 位作者 Fang-lin GU Jian WANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第6期788-795,共8页
Relay-aided device-to-device (D2D) communication is a promising technology for the next-generation cellular network. We study the transmission schemes for an amplify-and-forward relay-aided D2D system which has multip... Relay-aided device-to-device (D2D) communication is a promising technology for the next-generation cellular network. We study the transmission schemes for an amplify-and-forward relay-aided D2D system which has multiple antennas. To circumvent the prohibitive complexity problem of traditional maximum likelihood (ML) detection for full-rate space-time block code (FSTBC) transmission, two low-complexity detection methods are proposed, i.e., the detection methods with the ML-combining (MLC) algorithm and the joint conditional ML (JCML)detector. Particularly, the method with the JCML detector reduces detection delay at the cost of more storage and performs well with parallel implementation. Simulation results indicate that the proposed detection methods achieve a symbol error probability similar to that of the traditional ML detector for FSTBC transmission but with less complexity, and the performance of FSTBC transmission is significantly better than that of spatial multiplexing transmission. Diversity analysis for the proposed detection methods is also demonstrated by simulations. 展开更多
关键词 device-to-device RELAY DETECTION Full-rate space-time block code
原文传递
Reflecting Surface-Aided Device-to-Device Communications System
18
作者 Chiya Zhang Wenyu Chen +1 位作者 Chunlong He Xingquan Li 《Journal of Communications and Information Networks》 CSCD 2020年第4期403-410,共8页
Intelligent reflecting surface(IRS)is a promising technology for its capability of reflecting the incident signal towards the desired user.IRS can improve the efficiency of wireless communication systems.This paper in... Intelligent reflecting surface(IRS)is a promising technology for its capability of reflecting the incident signal towards the desired user.IRS can improve the efficiency of wireless communication systems.This paper introduces IRS into a device-to-device(D2D)communications system to improve the throughput of the D2D network.We adopt the block coordinate descent al-gorithm and semidefinite relaxation technique to optimize the beamforming vector,power allocation and phase shift matrix.Simulation results demonstrate that IRS is able to enhance the throughput of the D2D communications system,and the proposed algorithm significantly outper-forms the other benchmark algorithms. 展开更多
关键词 intelligent reflecting surface device-to-device communications block coordinate descent
原文传递
Outage Probability Analysis for D2D-Enabled Heterogeneous Cellular Networks with Exclusion Zone:A Stochastic Geometry Approach
19
作者 Yulei Wang Li Feng +3 位作者 Shumin Yao Hong Liang Haoxu Shi Yuqiang Chen 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期639-661,共23页
Interference management is one of the most important issues in the device-to-device(D2D)-enabled heterogeneous cellular networks(HetCNets)due to the coexistence of massive cellular and D2D devices in which D2D devices... Interference management is one of the most important issues in the device-to-device(D2D)-enabled heterogeneous cellular networks(HetCNets)due to the coexistence of massive cellular and D2D devices in which D2D devices reuse the cellular spectrum.To alleviate the interference,an efficient interference management way is to set exclusion zones around the cellular receivers.In this paper,we adopt a stochastic geometry approach to analyze the outage probabilities of cellular and D2D users in the D2D-enabled HetCNets.The main difficulties contain three aspects:1)how to model the location randomness of base stations,cellular and D2D users in practical networks;2)how to capture the randomness and interrelation of cellular and D2D transmissions due to the existence of random exclusion zones;3)how to characterize the different types of interference and their impacts on the outage probabilities of cellular and D2D users.We then run extensive Monte-Carlo simulations which manifest that our theoretical model is very accurate. 展开更多
关键词 device-to-device(D2D)-enabled heterogeneous cellular networks(HetCNets) exclusion zone stochastic geometry(SG) Matérn hard-core process(MHCP)
下载PDF
Monitoring the security of audio biomedical signals communications in wearable IoT healthcare
20
作者 Saeid Yazdanpanah Saman Shojae Chaeikar Alireza Jolfaei 《Digital Communications and Networks》 SCIE CSCD 2023年第2期393-399,共7页
Smart home devices are vulnerable to a variety of attacks.The matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,S... Smart home devices are vulnerable to a variety of attacks.The matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,Smart home).To handle these attacks,most studies have hitherto proposed authentication protocols that cannot necessarily be implemented in devices,especially during Device-to-Device(D2D)interactions.Tapping into the potential of Ethereum blockchain and smart contracts,this work proposes a lightweight authentication mechanism that enables safe D2D interactions in a smart home.The Ethereum blockchain enables the implementation of a decentralized prototype as well as a peer-to-peer distributed ledger system.The work also uses a single server queuing system model and the authentication mechanism to curtail DDoS attacks by controlling the number of service requests in the system.The simulation was conducted twenty times,each with varying number of devices chosen at random(ranging from 1 to 30).Each requester device sends an arbitrary request with a unique resource requirement at a time.This is done to measure the system's consistency across a variety of device capabilities.The experimental results show that the proposed protocol not only prevents colluding attacks,but also outperforms the benchmark protocols in terms of computational cost,message processing,and response times. 展开更多
关键词 DDoS attack device-to-device Smart homes Blockchain AUTHENTICATION Ethereum smart contract
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部