Muutke küpsiste eelistusi

Security-Aware Device-to-Device Communications Underlaying Cellular Networks 1st ed. 2016 [Pehme köide]

  • Formaat: Paperback / softback, 73 pages, kõrgus x laius: 235x155 mm, kaal: 1416 g, 18 Illustrations, color; 1 Illustrations, black and white; X, 73 p. 19 illus., 18 illus. in color., 1 Paperback / softback
  • Sari: SpringerBriefs in Electrical and Computer Engineering
  • Ilmumisaeg: 17-Jun-2016
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319324578
  • ISBN-13: 9783319324579
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 73 pages, kõrgus x laius: 235x155 mm, kaal: 1416 g, 18 Illustrations, color; 1 Illustrations, black and white; X, 73 p. 19 illus., 18 illus. in color., 1 Paperback / softback
  • Sari: SpringerBriefs in Electrical and Computer Engineering
  • Ilmumisaeg: 17-Jun-2016
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319324578
  • ISBN-13: 9783319324579
The objective of this SpringerBrief is to present security architectures and incentive mechanisms to realize system availability for D2D communications. D2D communications enable devices to communicate directly, improving resource utilization, enhancing user"s throughput, extending battery lifetime, etc. However, due to the open nature of D2D communications, there are two substantial technical challenges when applied to large-scale applications, that is, security and availability which is demonstrated in this book. This SpringerBrief proposes a secure data sharing protocol, which merges the advantages of public key cryptography and symmetric encryption, to achieve data security in D2D communications. Furthermore, a joint framework involving both the physical and application layer security technologies is proposed for multimedia service over D2D communications thus the scalable security service can be achieved without changing the current communication framework. Additionally, as

the system availability largely depends on the cooperation degree of the users, a graph-theory based cooperative content dissemination scheme is proposed to achieve maximal Quality of Experience (QoE) with fairness and efficiency.  This SpringerBrief will be a valuable resource for advanced-level students and researchers who want to learn more about cellular networks. 

Introduction.- Secure Data Transmission Protocol.- Joint Physical-application Layer Security.- Cooperation Stimulation.- Summary.
1 Introduction
1(14)
1.1 Overview of D2D Communications
1(7)
1.1.1 D2D Communications
1(1)
1.1.2 Application Scenario
2(1)
1.1.3 State-of-the-Art
3(5)
1.2 Security Issues
8(3)
1.2.1 Security Architecture
8(1)
1.2.2 Security Threats
9(1)
1.2.3 Security Requirements
10(1)
1.3 Organization
References
11(4)
2 Secure Data Transmission Protocol
15(16)
2.1 System Model
15(3)
2.1.1 Network Architecture
15(2)
2.1.2 Preliminaries
17(1)
2.2 Secure Data Transmission Protocol
18(5)
2.2.1 System Initialization
18(2)
2.2.2 Secure Data Transmission Protocol
20(3)
2.3 Performance Analysis
23(3)
2.3.1 Security Properties
23(1)
2.3.2 Overhead
24(2)
2.4 Discussions
26(2)
2.4.1 Certificateless Signature
26(1)
2.4.2 CLS-Based Data Transmission Protocol
27(1)
2.5 Conclusions
28(3)
References
3 Joint Physical-Application Layer Security
31(20)
3.1 Overview of Physical-Layer Security
31(9)
3.1.1 Secrecy Capacity
32(2)
3.1.2 Channel-Based Key Agreement
34(3)
3.1.3 Physical-Layer Authentication
37(3)
3.2 Physical-Layer Security for Wireless Multimedia Delivery
40(1)
3.2.1 Security Capacity
40(1)
3.2.2 Information Processing Approach
40(1)
3.3 Application-Layer Security for Wireless Multimedia Delivery
41(2)
3.3.1 Authentication
41(1)
3.3.2 Watermarking
42(1)
3.4 Joint Physical-Application Layer Security Scheme
43(3)
3.4.1 Framework Description
43(1)
3.4.2 Security-Aware Packetization
44(1)
3.4.3 Joint Scheme
45(1)
3.5 Conclusions and Outlook
46(1)
References
46(5)
4 Cooperation Stimulation
51(20)
4.1 System Model
52(2)
4.1.1 Network Architecture
52(1)
4.1.2 QoE Model
52(2)
4.2 Graph Models
54(4)
4.2.1 Basis of Graph Theory
54(2)
4.2.2 Candidate Graph Model
56(1)
4.2.3 Feasible Graph Model
56(2)
4.3 QoE-Driven Cooperation Stimulation
58(4)
4.3.1 Graph-Based Content Dissemination
58(4)
4.3.2 The Cooperative Content Dissemination Scheme
62(1)
4.4 Discussions
62(2)
4.5 Numerical Results
64(5)
4.5.1 Simulation Settings
65(1)
4.5.2 Simulation Results
65(4)
4.6 Conclusions
69(1)
References
69(2)
5 Summary
71
5.1 Summary of the Book
71(1)
5.2 Future Research Directions
72(1)
References
73