Security-Aware Device-to-Device Communications Underlaying Cellular Networks

Nonfiction, Computers, Networking & Communications, Hardware, Computer Security, General Computing
Cover of the book Security-Aware Device-to-Device Communications Underlaying Cellular Networks by Aiqing Zhang, Liang Zhou, Lei Wang, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Aiqing Zhang, Liang Zhou, Lei Wang ISBN: 9783319324586
Publisher: Springer International Publishing Publication: June 8, 2016
Imprint: Springer Language: English
Author: Aiqing Zhang, Liang Zhou, Lei Wang
ISBN: 9783319324586
Publisher: Springer International Publishing
Publication: June 8, 2016
Imprint: Springer
Language: English

The objective of this SpringerBrief is to present security architectures and incentive mechanisms to realize system availability for D2D communications. D2D communications enable devices to communicate directly, improving resource utilization, enhancing user’s throughput, extending battery lifetime, etc. However, due to the open nature of D2D communications, there are two substantial technical challenges when applied to large-scale applications, that is, security and availability which is demonstrated in this book.

This SpringerBrief proposes a secure data sharing protocol, which merges the advantages of public key cryptography and symmetric encryption, to achieve data security in D2D communications. Furthermore, a joint framework involving both the physical and application layer security technologies is proposed for multimedia service over D2D communications thus the scalable security service can be achieved without changing the current communication framework. Additionally, as the system availability largely depends on the cooperation degree of the users, a graph-theory based cooperative content dissemination scheme is proposed to achieve maximal Quality of Experience (QoE) with fairness and efficiency.

This SpringerBrief will be a valuable resource for advanced-level students and researchers who want to learn more about cellular networks.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The objective of this SpringerBrief is to present security architectures and incentive mechanisms to realize system availability for D2D communications. D2D communications enable devices to communicate directly, improving resource utilization, enhancing user’s throughput, extending battery lifetime, etc. However, due to the open nature of D2D communications, there are two substantial technical challenges when applied to large-scale applications, that is, security and availability which is demonstrated in this book.

This SpringerBrief proposes a secure data sharing protocol, which merges the advantages of public key cryptography and symmetric encryption, to achieve data security in D2D communications. Furthermore, a joint framework involving both the physical and application layer security technologies is proposed for multimedia service over D2D communications thus the scalable security service can be achieved without changing the current communication framework. Additionally, as the system availability largely depends on the cooperation degree of the users, a graph-theory based cooperative content dissemination scheme is proposed to achieve maximal Quality of Experience (QoE) with fairness and efficiency.

This SpringerBrief will be a valuable resource for advanced-level students and researchers who want to learn more about cellular networks.

More books from Springer International Publishing

Cover of the book Small Flying Drones by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Cellular Therapy for Stroke and CNS Injuries by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Meditation – Neuroscientific Approaches and Philosophical Implications by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Contributions to Networked and Event-Triggered Control of Linear Systems by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Who’s to Blame for Greece? by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Frederic W. Harmer: A Scientific Biography by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Artificial Life and Computational Intelligence by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Pervasive Computing Paradigms for Mental Health by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book A Journey through Manufacturing and Supply Chain Strategy Research by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Heuristic Search by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Formal Concept Analysis by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book The Visual Language of Technique by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Real-life Applications with Membrane Computing by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Market Microstructure and Nonlinear Dynamics by Aiqing Zhang, Liang Zhou, Lei Wang
Cover of the book Power System Grid Operation Using Synchrophasor Technology by Aiqing Zhang, Liang Zhou, Lei Wang
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy