[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Zou, 2018 - Google Patents

Intelligent interference exploitation for heterogeneous cellular networks against eavesdropping

Zou, 2018

View PDF
Document ID
11467753880946203757
Author
Zou Y
Publication year
Publication venue
IEEE Journal on Selected Areas in Communications

External Links

Snippet

This paper explores the co-existence of a macro cell and a small cell for heterogeneous cellular networks, where a macro base station (MBS) and small base station (SBS) transmit to respective macro user (MU) and small user (SU) through their shared spectrum in the face …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas
    • H04B7/022Site diversity; Macro-diversity
    • H04B7/024Co-operative use of antennas of several sites, e.g. in co-ordinated multipoint or co-operative multiple-input multiple-output [MIMO] systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/24Cell structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W72/00Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
    • H04W72/04Wireless resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/24Radio transmission systems, i.e. using radiation field for communication between two or more posts
    • H04B7/26Radio transmission systems, i.e. using radiation field for communication between two or more posts at least one of which is mobile
    • H04B7/2615Radio transmission systems, i.e. using radiation field for communication between two or more posts at least one of which is mobile using hybrid frequency-time division multiple access [FDMA-TDMA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00

Similar Documents

Publication Publication Date Title
Zou Intelligent interference exploitation for heterogeneous cellular networks against eavesdropping
Li et al. Security-reliability tradeoff analysis for cooperative NOMA in cognitive radio networks
Xiang et al. Physical layer security in cognitive radio inspired NOMA network
Nguyen et al. A new design paradigm for secure full-duplex multiuser systems
Zheng et al. Safeguarding decentralized wireless networks using full-duplex jamming receivers
Li et al. Secrecy outage probability analysis of friendly jammer selection aided multiuser scheduling for wireless networks
Yuan et al. Analysis on secrecy capacity of cooperative non-orthogonal multiple access with proactive jamming
Tran et al. Secure transmit antenna selection protocol for MIMO NOMA networks over Nakagami-m channels
Jiang et al. SIC-based secrecy performance in uplink NOMA multi-eavesdropper wiretap channels
Yin et al. Secrecy rate analysis of satellite communications with frequency domain NOMA
Vahidian et al. Relay selection for security-constrained cooperative communication in the presence of eavesdropper's overhearing and interference
Zou et al. Security-reliability tradeoff for distributed antenna systems in heterogeneous cellular networks
Tolossa et al. On the uplink secrecy capacity analysis in D2D-enabled cellular network
Kumar et al. Fundamental limits of spectrum sharing for NOMA-based cooperative relaying under a peak interference constraint
Wang et al. A unified QoS and security provisioning framework for wiretap cognitive radio networks: A statistical queueing analysis approach
Cao et al. Artificial noise aided secure communications for cooperative NOMA networks
Chen et al. Physical layer security in NOMA-enabled cognitive radio networks with outdated channel state information
Jia et al. Guaranteeing positive secrecy rate for NOMA system against internal eavesdropping
Kader et al. Device-to-device aided cooperative NOMA transmission exploiting overheard signal
Xu et al. Jamming-assisted legitimate eavesdropping and secure communication in multicarrier interference networks
Van Nguyen et al. Exploiting secrecy performance of uplink NOMA in cellular networks
Shukla et al. Ergodic secrecy sum rate analysis of a two-way relay NOMA system
Nguyen et al. Security-Reliability Analysis in CR-NOMA IoT Network Under I/Q Imbalance
Lv et al. Cooperative non-orthogonal relaying for security enhancement in untrusted relay networks
Zhao et al. Does D2D communication always benefit physical-layer security?