Security Aware Device to Device Communications Underlaying Cellular Networks 1st Edition by Aiqing Zhang, Liang Zhou Lei Wang – Ebook PDF Instant Download/Delivery: 3319324578, 978-3319324579
Full download Security Aware Device to Device Communications Underlaying Cellular Networks 1st edition after payment

Product details:
ISBN 10: 3319324578
ISBN 13: 978-3319324579
Author: Aiqing Zhang, Liang Zhou Lei Wang
The objective of this SpringerBrief is to present security architectures and incentive mechanisms to realize system availability for D2D communications. D2D communications enable devices to communicate directly, improving resource utilization, enhancing user’s throughput, extending battery lifetime, etc. However, due to the open nature of D2D communications, there are two substantial technical challenges when applied to large-scale applications, that is, security and availability which is demonstrated in this book.
This SpringerBrief proposes a secure data sharing protocol, which merges the advantages of public key cryptography and symmetric encryption, to achieve data security in D2D communications. Furthermore, a joint framework involving both the physical and application layer security technologies is proposed for multimedia service over D2D communications thus the scalable security service can be achieved without changing the current communication framework. Additionally, as the system availability largely depends on the cooperation degree of the users, a graph-theory based cooperative content dissemination scheme is proposed to achieve maximal Quality of Experience (QoE) with fairness and efficiency.
This SpringerBrief will be a valuable resource for advanced-level students and researchers who want to learn more about cellular networks.
Security Aware Device to Device Communications Underlaying Cellular Networks 1st Table of contents:
1 Introduction
1.1 Overview of D2D Communications
1.1.1 D2D Communications
1.1.2 Application Scenario
1.1.3 State-of-the-Art
1.1.3.1 Physical-Layer Techniques
1.1.3.2 Content Dissemination
1.1.3.3 Security
1.1.3.4 Cooperation Stimulation
1.2 Security Issues
1.2.1 Security Architecture
1.2.2 Security Threats
1.2.3 Security Requirements
1.3 Organization
References
2 Secure Data Transmission Protocol
2.1 System Model
2.1.1 Network Architecture
2.1.2 Preliminaries
2.2 Secure Data Transmission Protocol
2.2.1 System Initialization
2.2.2 Secure Data Transmission Protocol
2.3 Performance Analysis
2.3.1 Security Properties
2.3.2 Overhead
2.4 Discussions
2.4.1 Certificateless Signature
2.4.2 CLS-Based Data Transmission Protocol
2.5 Conclusions
References
3 Joint Physical–Application Layer Security
3.1 Overview of Physical-Layer Security
3.1.1 Secrecy Capacity
3.1.2 Channel-Based Key Agreement
3.1.3 Physical-Layer Authentication
3.2 Physical-Layer Security for Wireless Multimedia Delivery
3.2.1 Security Capacity
3.2.2 Information Processing Approach
3.3 Application-Layer Security for Wireless Multimedia Delivery
3.3.1 Authentication
3.3.2 Watermarking
3.4 Joint Physical–Application Layer Security Scheme
3.4.1 Framework Description
3.4.2 Security-Aware Packetization
3.4.3 Joint Scheme
3.5 Conclusions and Outlook
References
4 Cooperation Stimulation
4.1 System Model
4.1.1 Network Architecture
4.1.2 QoE Model
4.2 Graph Models
4.2.1 Basis of Graph Theory
4.2.2 Candidate Graph Model
4.2.3 Feasible Graph Model
4.3 QoE-Driven Cooperation Stimulation
4.3.1 Graph-Based Content Dissemination
4.3.2 The Cooperative Content Dissemination Scheme
4.4 Discussions
4.5 Numerical Results
4.5.1 Simulation Settings
4.5.2 Simulation Results
4.6 Conclusions
References
5 Summary
5.1 Summary of the Book
5.2 Future Research Directions
People also search for Security Aware Device to Device Communications Underlaying Cellular Networks 1st:
security communication devices
device-to-device communications for national security and public safety
a security service available in 802.15.4
a device authenticates a person’s identity by translating
bluetooth devices cannot be secured
Tags: Aiqing Zhang, Liang Zhou Lei Wa, Security Aware, Device Communications


