Security-Aware Device-to-Device Communications Underlaying Cellular Networks

Nonfiction, Computers, Networking & Communications, Hardware, Computer Security, General Computing
Cover of the book Security-Aware Device-to-Device Communications Underlaying Cellular Networks by Aiqing Zhang, Liang Zhou, Lei Wang, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Aiqing Zhang, Liang Zhou, Lei Wang ISBN: 9783319324586
Publisher: Springer International Publishing Publication: June 8, 2016
Imprint: Springer Language: English
Author: Aiqing Zhang, Liang Zhou, Lei Wang
ISBN: 9783319324586
Publisher: Springer International Publishing
Publication: June 8, 2016
Imprint: Springer
Language: English

The objective of this SpringerBrief is to present security architectures and incentive mechanisms to realize system availability for D2D communications. D2D communications enable devices to communicate directly, improving resource utilization, enhancing user’s throughput, extending battery lifetime, etc. However, due to the open nature of D2D communications, there are two substantial technical challenges when applied to large-scale applications, that is, security and availability which is demonstrated in this book.

This SpringerBrief proposes a secure data sharing protocol, which merges the advantages of public key cryptography and symmetric encryption, to achieve data security in D2D communications. Furthermore, a joint framework involving both the physical and application layer security technologies is proposed for multimedia service over D2D communications thus the scalable security service can be achieved without changing the current communication framework. Additionally, as the system availability largely depends on the cooperation degree of the users, a graph-theory based cooperative content dissemination scheme is proposed to achieve maximal Quality of Experience (QoE) with fairness and efficiency.

This SpringerBrief will be a valuable resource for advanced-level students and researchers who want to learn more about cellular networks.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The objective of this SpringerBrief is to present security architectures and incentive mechanisms to realize system availability for D2D communications. D2D communications enable devices to communicate directly, improving resource utilization, enhancing user’s throughput, extending battery lifetime, etc. However, due to the open nature of D2D communications, there are two substantial technical challenges when applied to large-scale applications, that is, security and availability which is demonstrated in this book.

This SpringerBrief proposes a secure data sharing protocol, which merges the advantages of public key cryptography and symmetric encryption, to achieve data security in D2D communications. Furthermore, a joint framework involving both the physical and application layer security technologies is proposed for multimedia service over D2D communications thus the scalable security service can be achieved without changing the current communication framework. Additionally, as the system availability largely depends on the cooperation degree of the users, a graph-theory based cooperative content dissemination scheme is proposed to achieve maximal Quality of Experience (QoE) with fairness and efficiency.

This SpringerBrief will be a valuable resource for advanced-level students and researchers who want to learn more about cellular networks.

More books from Springer International Publishing

Cover of the book Boredom in the Classroom by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book SiGe-based Re-engineering of Electronic Warfare Subsystems by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Social Informatics by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Data Driven Approaches in Digital Education by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Handling Uncertainty and Networked Structure in Robot Control by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book The Double Constraint Inversion Methodology by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Literary Translation and Cultural Mediators in 'Peripheral' Cultures by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Business Process Management Forum by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Approximation of Stochastic Invariant Manifolds by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Sustainability of Agricultural Environment in Egypt: Part I by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Enhancing Energy Efficiency in Irrigation by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Computer Performance Engineering by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Essentials of Measure Theory by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Dynamics of Distribution and Diffusion of New Technology by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Retail Crime by Aiqing Zhang, Liang Zhou, Lei Wang
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy