Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Engineering
An Extensive Game-Based Resource Allocation For Securing D2d Underlay Communications, Oleksii Rudenko, Yuhong Liu, Chenwei Wang, Susanto Rahardja
An Extensive Game-Based Resource Allocation For Securing D2d Underlay Communications, Oleksii Rudenko, Yuhong Liu, Chenwei Wang, Susanto Rahardja
Computer Science and Engineering
Device-to-device (D2D) communication has been increasingly attractive due to its great potential to improve cellular communication performance. While resource allocation optimization for improving the spectrum efficiency is of interest in the D2D-related work, communication security, as a key issue in the system design, has not been well investigated yet. Recently, a few studies have shown that D2D users can actually serve as friendly jammers to help enhance the security of cellular user communication against eavesdropping attacks. However, only a few studies considered the security of D2D communications. In this paper, we consider the secure resource allocation problem, particularly, how to …