Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Santa Clara University

Series

2019

Security

Articles 1 - 1 of 1

Full-Text Articles in Engineering

An Extensive Game-Based Resource Allocation For Securing D2d Underlay Communications, Oleksii Rudenko, Yuhong Liu, Chenwei Wang, Susanto Rahardja Mar 2019

An Extensive Game-Based Resource Allocation For Securing D2d Underlay Communications, Oleksii Rudenko, Yuhong Liu, Chenwei Wang, Susanto Rahardja

Computer Science and Engineering

Device-to-device (D2D) communication has been increasingly attractive due to its great potential to improve cellular communication performance. While resource allocation optimization for improving the spectrum efficiency is of interest in the D2D-related work, communication security, as a key issue in the system design, has not been well investigated yet. Recently, a few studies have shown that D2D users can actually serve as friendly jammers to help enhance the security of cellular user communication against eavesdropping attacks. However, only a few studies considered the security of D2D communications. In this paper, we consider the secure resource allocation problem, particularly, how to …