Title :
Secure communications with D2D cooperation
Author :
Ghanem, Samah A. M. ; Ara, Munnujahan
Author_Institution :
Mobile Commun. Dept., Eurecom, Sophia Antipolis, France
Abstract :
Device to Device (D2D) communications provides a promising technique for 5G wireless networks, supporting higher data rates. Security of data transmission over wireless clouds could put constraints on devices; whether to cooperate or not. Therefore, our aim is to provide analytical framework for the security at the physical layer and to define the constraints embodied with cooperation in wireless clouds1. In this paper, two legitimate transmitters Alice and John cooperate to increase the reliable transmission rate received by their common legitimate receiver Bob, where one eavesdropper, Eve exists. We propose a distributed algorithm that allows the devices to select whether to cooperate or not and to adapt their optimal power allocation based on the cooperation framework selected. Moreover, we define distance constraints to enforce the benefits of cooperation between devices in a wireless cloud.
Keywords :
5G mobile communication; 5G wireless networks; Bob; D2D cooperation; Eve; device to device communications; distance constraints; distributed algorithm; legitimate receiver; wireless clouds; Jamming; Relays; Reliability; Tin;
Conference_Titel :
Communications, Signal Processing, and their Applications (ICCSPA), 2015 International Conference on
Conference_Location :
Sharjah
DOI :
10.1109/ICCSPA.2015.7081278