Zou, 2018 - Google Patents
Intelligent interference exploitation for heterogeneous cellular networks against eavesdroppingZou, 2018
View PDF- Document ID
- 11467753880946203757
- Author
- Zou Y
- Publication year
- Publication venue
- IEEE Journal on Selected Areas in Communications
External Links
Snippet
This paper explores the co-existence of a macro cell and a small cell for heterogeneous cellular networks, where a macro base station (MBS) and small base station (SBS) transmit to respective macro user (MU) and small user (SU) through their shared spectrum in the face …
- 230000001413 cellular 0 title abstract description 32
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas
- H04B7/022—Site diversity; Macro-diversity
- H04B7/024—Co-operative use of antennas of several sites, e.g. in co-ordinated multipoint or co-operative multiple-input multiple-output [MIMO] systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
- H04W84/042—Public Land Mobile systems, e.g. cellular systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/24—Cell structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W72/00—Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
- H04W72/04—Wireless resource allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/14—Spectrum sharing arrangements between different networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/24—Radio transmission systems, i.e. using radiation field for communication between two or more posts
- H04B7/26—Radio transmission systems, i.e. using radiation field for communication between two or more posts at least one of which is mobile
- H04B7/2615—Radio transmission systems, i.e. using radiation field for communication between two or more posts at least one of which is mobile using hybrid frequency-time division multiple access [FDMA-TDMA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zou | Intelligent interference exploitation for heterogeneous cellular networks against eavesdropping | |
Li et al. | Security-reliability tradeoff analysis for cooperative NOMA in cognitive radio networks | |
Xiang et al. | Physical layer security in cognitive radio inspired NOMA network | |
Nguyen et al. | A new design paradigm for secure full-duplex multiuser systems | |
Zheng et al. | Safeguarding decentralized wireless networks using full-duplex jamming receivers | |
Li et al. | Secrecy outage probability analysis of friendly jammer selection aided multiuser scheduling for wireless networks | |
Yuan et al. | Analysis on secrecy capacity of cooperative non-orthogonal multiple access with proactive jamming | |
Tran et al. | Secure transmit antenna selection protocol for MIMO NOMA networks over Nakagami-m channels | |
Jiang et al. | SIC-based secrecy performance in uplink NOMA multi-eavesdropper wiretap channels | |
Yin et al. | Secrecy rate analysis of satellite communications with frequency domain NOMA | |
Vahidian et al. | Relay selection for security-constrained cooperative communication in the presence of eavesdropper's overhearing and interference | |
Zou et al. | Security-reliability tradeoff for distributed antenna systems in heterogeneous cellular networks | |
Tolossa et al. | On the uplink secrecy capacity analysis in D2D-enabled cellular network | |
Kumar et al. | Fundamental limits of spectrum sharing for NOMA-based cooperative relaying under a peak interference constraint | |
Wang et al. | A unified QoS and security provisioning framework for wiretap cognitive radio networks: A statistical queueing analysis approach | |
Cao et al. | Artificial noise aided secure communications for cooperative NOMA networks | |
Chen et al. | Physical layer security in NOMA-enabled cognitive radio networks with outdated channel state information | |
Jia et al. | Guaranteeing positive secrecy rate for NOMA system against internal eavesdropping | |
Kader et al. | Device-to-device aided cooperative NOMA transmission exploiting overheard signal | |
Xu et al. | Jamming-assisted legitimate eavesdropping and secure communication in multicarrier interference networks | |
Van Nguyen et al. | Exploiting secrecy performance of uplink NOMA in cellular networks | |
Shukla et al. | Ergodic secrecy sum rate analysis of a two-way relay NOMA system | |
Nguyen et al. | Security-Reliability Analysis in CR-NOMA IoT Network Under I/Q Imbalance | |
Lv et al. | Cooperative non-orthogonal relaying for security enhancement in untrusted relay networks | |
Zhao et al. | Does D2D communication always benefit physical-layer security? |