MDS Coded Caching for Device-to-Device Content Sharing Against Eavesdropping |
Shi, Xin
(College of Communications Engineering, Army Engineering University of PLA)
Wu, Dan (College of Communications Engineering, Army Engineering University of PLA) Wang, Meng (College of Communications Engineering, Army Engineering University of PLA) Yang, Lianxin (College of Communications Engineering, Army Engineering University of PLA) Wu, Yan (College of Communications Engineering, Army Engineering University of PLA) |
1 | L. Wang, H. Wu, Y. Ding, W. Chen, and H. V. Poor, "Hypergraph-Based Wireless Distributed Storage Optimization for Cellular D2D Underlays," IEEE Journal on Selected Areas in Communications, vol. 34, no. 10, pp. 2650-2666, Oct. 2016. DOI |
2 | F. Gabry, V. Bioglio, and I. Land, "On edge caching in the presence of malicious users," in Proc. of 2016 IEEE International Conference on Communications Workshops, Kuala Lumpur, pp. 278-283, 2016. |
3 | D. Wu, L. Zhou, Y. Cai, H. Chao, and Y. Qian, "Physical-Social-Aware D2D Content Sharing Networks: A Provider-Demander Matching Game," IEEE Transactions on Vehicular Technology, vol. 67, no. 8, pp. 7538-7549, Aug. 2018. DOI |
4 | M. Baldi, M. Bianchi, N. Maturo, and F. Chiaraluce, "A Physical Layer Secured Key Distribution Technique for IEEE 802.11g Wireless Networks," IEEE Wireless Communications Letters, vol. 2, no. 2, pp. 183-186, Apr. 2013. DOI |
5 | T. T. Tran and H. Y. Kong, "CSI-Secured Orthogonal Jamming Method for Wireless Physical Layer Security," IEEE Communications Letters, vol. 18, no. 5, pp. 841-844, May 2014. DOI |
6 | Y. Liu, H. Chen, and L. Wang, "Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges," IEEE Communications Surveys & Tutorials, vol. 19, no. 1, pp. 347-376, 1st Quart., 2017. DOI |
7 | L. Zhou, D. Wu, B. Zheng, and M. Guizani, "Joint physical-application layer security for wireless multimedia delivery," IEEE Communications Magazine, vol. 52, no. 3, pp. 66-72, Mar. 2014. DOI |
8 | Y. Wu, D. Wu, L. Yang, and S. Xu, "Incentive-based cluster formation for D2D multicast content sharing," in Proc. of 2018 Asia-Pacific Conference on Communications, Ningbo, China, pp. 125-130, 2018. |
9 | J. Liao, K. Wong, Y. Zhang, Z. Zheng, and K. Yang, "MDS Coded Cooperative Caching for Heterogeneous Small Cell Networks," in Proc. of 2017 IEEE Global Communications Conference, Singapore, pp. 1-7, 2017. |
10 | W. Zhang, W. He, D. Wu, and Y. Cai, "Joint Mode Selection, Link Allocation and Power Control in Underlaying D2D Communication," KSII Transactions on Internet and Information Systems, vol. 10, no. 11, pp. 5209-5228, Nov. 2016. DOI |
11 | M. Ji, A. M. Tulino, J. Llorca, and G. Caire, "On the average performance of caching and coded multicasting with random demands," in Proc. of 2014 International Symposium on Wireless Communications Systems, Barcelona, pp. 922-926, 2014. |
12 | L. Sun, Q. Du, P. Ren, and Y. Wang, "Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation," IEEE Transactions on Vehicular Technology, vol. 65, no. 10, pp. 8767-8774, Oct. 2016. DOI |
13 | L. Sun and H. Xu, "Fountain-Coding-Based Secure Communications Exploiting Outage Prediction and Limited Feedback," IEEE Transactions on Vehicular Technology, vol. 68, no. 1, pp. 740-753, Jan. 2019. DOI |
14 | M. Ji, G. Caire, and A. F. Molisch, "Wireless Device-to-Device Caching Networks: Basic Principles and System Performance," IEEE Journal on Selected Areas in Communications, vol. 34, no. 1, pp. 176-189, Jan. 2016. DOI |
15 | S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, 2004. |
16 | B. S. C. Choi and M. Gerla, "Wireless Interrupt: Inter-Device Signaling in Next Generation Wireless Networks," in Proc. of 2010 IEEE Conference on Computer Communications Workshops, San Diego, CA, pp. 1-5, 2010. |
17 | S. A. Saberali, L. Lampe, and I. F. Blake, "Decentralized Coded Caching Without File Splitting," IEEE Transactions on Wireless Communications, vol. 18, no. 2, pp. 1289-1303, Feb. 2019. DOI |
18 | J. Pedersen, A. G. i. Amat, I. Andriyanova, and F. Brannstrom, "Optimizing MDS Coded Caching in Wireless Networks With Device-to-Device Communication," IEEE Transactions on Wireless Communications, vol. 18, no. 1, pp. 286-295, Jan. 2019. DOI |
19 | T. D. Tran, T. D. Hoang, and L. B. Le, "Caching for Heterogeneous Small-Cell Networks With Bandwidth Allocation and Caching-Aware BS Association," IEEE Wireless Communications Letters, vol. 8, no. 1, pp. 49-52, Feb. 2019. DOI |
20 | D. Wu, L. Zhou, and Y. Cai, "Social-Aware Rate Based Content Sharing Mode Selection for D2D Content Sharing Scenarios," IEEE Transactions on Multimedia, vol. 19, no. 11, pp. 2571-2582, Nov. 2017. DOI |
21 | D. Wu, L. Zhou, Y. Cai, and Y. Qian, "Optimal Content Sharing Mode Selection for Social-Aware D2D Communications," IEEE Wireless Communications Letters, vol. 7, no. 6, pp. 910-913, Dec. 2018. DOI |
22 | J. Qu, L. Zhou, G. Zhang, D. Wu, J. Zheng, and Y. Cai, "Secure Caching in D2D Content Sharing," in Proc. of 2018 IEEE International Conference on Communications Workshops, pp. 1-6, Kansas City, MO, 2018. |
23 | R. Wang, X. Peng, J. Zhang, and K. B. Letaief, "Mobility-aware caching for content-centric wireless networks: modeling and methodology," IEEE Communications Magazine, vol. 54, no. 8, pp. 77-83, Aug. 2016. DOI |
24 | M. Sheng, C. Xu, J. Liu, J. Song, X. Ma, and J. Li, "Enhancement for content delivery with proximity communications in caching enabled wireless networks: architecture and challenges," IEEE Communications Magazine, vol. 54, no. 8, pp. 70-76, Aug. 2016. DOI |
25 | D. Wu, L. Zhou, Y. Cai, and Y. Qian, "Collaborative Caching and Matching for D2D Content Sharing," IEEE Wireless Communications, vol. 25, no. 3, pp. 43-49, June 2018. DOI |
26 | M. Ahmed, Y. Li, M. Waqas, M. Sheraz, D. Jin, and Z. Han, "A Survey on Socially Aware Device-to-Device Communications," IEEE Communications Surveys & Tutorials, vol. 20, no. 3, pp. 2169-2197, 3rd Quart., 2018. DOI |
27 | C. E. Shannon, "Communication theory of secrecy systems," The Bell System Technical Journal, vol. 28, no. 4, pp. 656-715, 1949. DOI |
28 | J. Liao, K. Wong, Y. Zhang, Z. Zheng, and K. Yang, "Coding, Multicast, and Cooperation for Cache- Enabled Heterogeneous Small Cell Networks," IEEE Transactions on Wireless Communications, vol. 16, no. 10, pp. 6838-6853, Oct. 2017. DOI |
29 | M. Haus, M. Waqas, A. Y. Ding, Y. Li, S. Tarkoma, and J. Ott, "Security and Privacy in Device-to-Device (D2D) Communication: A Review," IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 1054-1079, 2nd Quart., 2017. DOI |
30 | A. Zhang and X. Lin, "Security-Aware and Privacy-Preserving D2D Communications in 5G," IEEE Network, vol. 31, no. 4, pp. 70-77, 2017. DOI |
31 | M. Ahmed, H. Shi, X. Chen, Y. Li, M. Waqas, and D. Jin, "Socially Aware Secrecy-Ensured Resource Allocation in D2D Underlay Communication: An Overlapping Coalitional Game Scheme," IEEE Transactions on Wireless Communications, vol. 17, no. 6, pp. 4118-4133, June 2018. DOI |
32 | L. Wang, J. Liu, M. Chen, G. Gui, and H. Sari, "Optimization-Based Access Assignment Scheme for Physical-Layer Security in D2D Communications Underlaying a Cellular Network," IEEE Transactions on Vehicular Technology, vol. 67, no. 7, pp. 5766-5777, July 2018. DOI |
33 | J. Wang, Y. Huang, S. Jin, R. Schober, X. You, and C. Zhao, "Resource Management for Device-to-Device Communication: A Physical Layer Security Perspective," IEEE Journal on Selected Areas in Communications, vol. 36, no. 4, pp. 946-960, Apr. 2018. DOI |
34 | F. Gabry, V. Bioglio, and I. Land, "On edge caching with secrecy constraints," in Proc. of 2016 IEEE International Conference on Communications, Kuala Lumpur, pp. 1-6, 2016. |
35 | V. Bioglio, F. Gabry, and I. Land, "Optimizing MDS Codes for Caching at the Edge," in Proc. of 2015 IEEE Global Communications Conference, San Diego, CA, pp. 1-6, 2015. |
![]() |