SCIENCE CHINA Information Sciences, Volume 61, Issue 2: 029305(2018) https://doi.org/10.1007/s11432-016-9201-7

Secure resource allocation for green and cognitive device-to-device communication

Chi XU1,2,3, Peng ZENG1,2, Wei LIANG1,2, Haibin YU1,2,*
More info
  • ReceivedDec 23, 2016
  • AcceptedAug 5, 2017
  • PublishedNov 20, 2017


There is no abstract available for this article.


This work was supported by National Natural Science Foundation of China (Grant Nos. 61233007, 61533015, 71661147005).


[1] Ma Z, Zhang Z Q, Ding Z G, et al. Key techniques for 5G wireless communications: network architecture, physical layer, and MAC layer perspectives. Sci China Inf Sci, 2015, 58: 041301. Google Scholar

[2] Huang X Q, Han T, Ansari N. On green-energy-powered cognitive radio networks. IEEE Commun Surv Tuts, 2015, 17: 827--842. Google Scholar

[3] Wang H-M, Xia X-G. Enhancing wireless secrecy via cooperation: signal design and optimization. IEEE Commun Mag, 2015, 53: 47--53. Google Scholar

[4] Xu C, Zheng M, Liang W, et al. End-to-end throughput maximization for underlay multi-hop cognitive radio networks with RF energy harvesting. IEEE Trans Wirel Commun, 2017, 16: 3561--3572. Google Scholar

[5] Sakr A H, Hossain E. Cognitive and energy harvesting-based D2D communication in cellular networks: stochastic geometry modeling and analysis. IEEE Trans Commun, 2015, 63: 1867--1880. Google Scholar

[6] Wang W, Teh K C, Li K H. Enhanced physical layer security in D2D spectrum sharing networks. IEEE Wirel Commun Lett, 2017, 6: 106--109. Google Scholar

[7] Liu Y, Wang L, Zaidi S A R, et al. Secure D2D communication in large-scale cognitive cellular networks: a wireless power transfer model. IEEE Trans Commun, 2016, 64: 329--342. Google Scholar

[8] Palomar D P, Chiang M. A tutorial on decomposition methods for network utility maximization. IEEE J Sel Areas Commun, 2006, 24: 1439--1451. Google Scholar

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1       京公网安备11010102003388号