Security-Aware Device-to-Device Communications Underlaying Cellular Networks

Nonfiction, Computers, Networking & Communications, Hardware, Computer Security, General Computing
Cover of the book Security-Aware Device-to-Device Communications Underlaying Cellular Networks by Aiqing Zhang, Liang Zhou, Lei Wang, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Aiqing Zhang, Liang Zhou, Lei Wang ISBN: 9783319324586
Publisher: Springer International Publishing Publication: June 8, 2016
Imprint: Springer Language: English
Author: Aiqing Zhang, Liang Zhou, Lei Wang
ISBN: 9783319324586
Publisher: Springer International Publishing
Publication: June 8, 2016
Imprint: Springer
Language: English

The objective of this SpringerBrief is to present security architectures and incentive mechanisms to realize system availability for D2D communications. D2D communications enable devices to communicate directly, improving resource utilization, enhancing user’s throughput, extending battery lifetime, etc. However, due to the open nature of D2D communications, there are two substantial technical challenges when applied to large-scale applications, that is, security and availability which is demonstrated in this book.

This SpringerBrief proposes a secure data sharing protocol, which merges the advantages of public key cryptography and symmetric encryption, to achieve data security in D2D communications. Furthermore, a joint framework involving both the physical and application layer security technologies is proposed for multimedia service over D2D communications thus the scalable security service can be achieved without changing the current communication framework. Additionally, as the system availability largely depends on the cooperation degree of the users, a graph-theory based cooperative content dissemination scheme is proposed to achieve maximal Quality of Experience (QoE) with fairness and efficiency.

This SpringerBrief will be a valuable resource for advanced-level students and researchers who want to learn more about cellular networks.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The objective of this SpringerBrief is to present security architectures and incentive mechanisms to realize system availability for D2D communications. D2D communications enable devices to communicate directly, improving resource utilization, enhancing user’s throughput, extending battery lifetime, etc. However, due to the open nature of D2D communications, there are two substantial technical challenges when applied to large-scale applications, that is, security and availability which is demonstrated in this book.

This SpringerBrief proposes a secure data sharing protocol, which merges the advantages of public key cryptography and symmetric encryption, to achieve data security in D2D communications. Furthermore, a joint framework involving both the physical and application layer security technologies is proposed for multimedia service over D2D communications thus the scalable security service can be achieved without changing the current communication framework. Additionally, as the system availability largely depends on the cooperation degree of the users, a graph-theory based cooperative content dissemination scheme is proposed to achieve maximal Quality of Experience (QoE) with fairness and efficiency.

This SpringerBrief will be a valuable resource for advanced-level students and researchers who want to learn more about cellular networks.

More books from Springer International Publishing

Cover of the book Database and Expert Systems Applications by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Multi-hazard Approaches to Civil Infrastructure Engineering by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book How Socio-Cultural Codes Shaped Violent Mobilization and Pro-Insurgent Support in the Chechen Wars by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book New Perspectives on the History of Facial Hair by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Codes, Cryptology and Information Security by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Mechanical and Materials Engineering of Modern Structure and Component Design by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book A Simple Introduction to the Mixed Finite Element Method by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book ICT for Agriculture and Environment by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Airports, Cities, and the Jet Age by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Unconventional Computation and Natural Computation by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Mammoth Cave by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book The Changing Faces of Space by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Color-Induced Graph Colorings by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Deep Sky Observing by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Guide to Security in SDN and NFV by Aiqing Zhang, Liang Zhou, Lei Wang
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy