|
[1] A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity—part I: system description,” IEEE Trans. Commun., vol. 51, no. 11, pp. 1927–1938, Nov. 2003. [2] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity in wireless networks: efficient protocols and outage behavior,” IEEE Trans. Inform. Theory, vol. 50, no.12, Dec. 2004. [3] Y.-W. Hong, W.-J. Huang, F.-H. Chiu, and C.-C. J. Kuo, “Cooperative communications in resource-constrained wireless networks,” IEEE Signal Proc. Mag., vol. 24, no. 3, pp. 47–57, May 2007. [4] Federal Communications Commission, “The mobile broadband spectrum challenge: international comparisons,” FCC White Paper, Wireless Telecommunications Bureau, Office of Engineering and Technology. Washington, DC.: Federal Communications Commission, pp. 1–19, Feb. 2013. [5] C. Liang and F. R. Yu, “Wireless network virtualization: a survey, some research issues and challenges,” IEEE Commun. Surveys Tuts., vol. 17, no. 1, pp. 358–380, Mar. 2015. [6] F. Granelli, A. A. Gebremariam, M. Usman, F. Cugini, V. Stamati, M. Alitska, and P. Chatzimisios, “Software defined and virtualized wireless access in future wireless networks: scenarios and standards,” IEEE Commun. Mag., vol. 53, no. 6, pp. 26–34, Jun. 2015. [7] K.-C. Lee, S.-H. Wang, C.-P. Li, H.-H. Chang, and H.-J. Li, “Adaptive resource allocation algorithm based on cross-entropy method for OFDMA systems,” IEEE Trans. Broadcast., vol. 60, no. 3, pp. 524–531, Sep. 2014. [8] G. Araniti, “A low-complexity resource allocation algorithm for multicast service delivery in OFDMA networks,” IEEE Trans. Broadcast., vol. 60, no. 2, pp. 358–369, Jun. 2014. [9] J. Xu, S.-J. Lee, W.-S. Kang, and J.-S. Seo, “Adaptive resource allocation for MIMOOFDM based wireless multicast systems,” IEEE Trans. Broadcast., vol. 56, no. 1, pp. 98–102, Mar. 2010. [10] A. Moubayed, A. Shami, and H. Lutfiyya, “Wireless resource virtualization with device-to-device communication underlaying LTE network,” IEEE Trans. Broadcast., vol. 61, no. 4, pp. 734–740, Dec. 2015. [11] P. Phunchongharn, E. Hossain, and D. I. Kim, “Resource allocation for device-todevice communications underlaying LTE-advanced networks,” IEEE Wireless Commun., vol. 20, no. 4, pp. 91–100, Aug. 2013. [12] L.-C. Lo and W.-J. Huang, “Misbehavior detection without channel information in cooperative networks,” in Proc. IEEE Veh. Tech. Conf. (VTC Fall), Sep. 2011, pp. 1–5. [13] W. Gong, X. Wang, M. Li, and Z. Huang, “Round-robin resource sharing algorithm for device-to-device communications underlying SFN System,” in Proc. IEEE Veh. Tech. Conf. (VTC Spring), May 2014, pp. 1–5. [14] P. Michiardi and R. Molva, “Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks,” in Proc. IFIP TC6/TC11 6th Joint Working Conf. Commun. Multimedia Security, Sep. 2002, pp. 107–121. [15] S. Buchegger and J.-Y. Le Boudec, “Performance analysis of the CONFIDANT protocol,” in Proc. 3rd ACM Intl. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), Jun. 2002, pp. 226–236. [16] Y. Mao and M. Wu, “Security issues in cooperative communications: tracing adversarial relays,” in Proc. IEEE Intl. Conf. Acoust., Spee. and Sig. Proc. (ICASSP), May 2006, pp. 14–19. [17] Y. Mao and M. Wu, “Tracing malicious relays in cooperative wireless communications,” IEEE Trans. Inform. Forensics and Security, vol. 2, no. 2, pp. 198–212, Jun. 2007. [18] T. A. Khalaf and S. W. Kim; “Error probability in multi-source, multi-relay networks under falsified data injection attacks,” in Proc. IEEE Military Communications Conference (MILCOM), Nov. 2008, pp. 1–4. [19] H. Liang and C. Wei, “Information theory and cryptography based secured communication scheme for cooperative MIMO communication in wireless sensor networks,” ELSEVIER Ad Hoc Networks, vol. 14, pp. 95–105, Mar. 2014. [20] T. A. Khalaf, S. W. Kim, and A. E. Abdel-Hakim, “Tradeoff between reliability and security in multiple access relay networks under falsified data injection attack,” IEEE Trans. Inform. Forensics and Security, vol. 9, no. 3, pp. 1126–1139, Mar. 2014. [21] S. Dehnie, H. Sencar, and N. Memon, “Cooperative diversity in the presence of misbehaving relay: performance analysis,” in in Proc. IEEE Sarnoff Symposium, Apr. 2007, pp. 1–7. [22] S. Dehnie, H. Sencar, and N. Memon, “Detecting malicious behavior in cooperative diversity,” in Proc. Conf. Inform. Science and Systems (CISS), Mar. 2007, pp. 895–899. [23] Y. Liu, Y. Wu, and J. Tang, “Two tier detection model for misbehavior of lowpower nodes in virtual MIMO based wireless networks,” in Proc. IEEE International Conference on Information Assurance and Security (IAS), Aug. 2010, pp. 155–160. [24] W. Hou, X. Wang, and A. Refaey, “Misbehavior detection in amplify-and-forward cooperative OFDM systems.” in Proc. IEEE Intl. Conf. Commun. (ICC), Jun. 2013, pp. 5345–5349. [25] R. Changiz, H. Halabian, F.-R. Yu, I. Lambadaris, H. Tang, and P. C. Mason, “Trust establishment in cooperative wireless networks,” in Proc. IEEE Military Communications Conference (MILCOM), pp. 1074–1079, Nov. 2010. [26] Z. Han and Y.-L. Sun, “Securing cooperative transmission in wireless communications,” in Proc. Fourth Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous), Aug. 2007, pp. 1–6. [27] L. Militano, M. Condoluci, G. Araniti, A. Molinaro, A. Iera, and G.M. Muntean, “Single frequency-based device-to-device-enhanced video delivery for evolved multimedia broadcast and multicast services,” IEEE Trans. Broadcast., vol. 61, no. 2, pp. 263–278, Jun. 2015. [28] C. Ma, Y. Li, H. Yu, X. Gan, X. Wang, Y. Ren, and J. Xu, “Cooperative spectrum sharing in D2D-enabled cellular networks,” IEEE Trans. Commun., vol. 64, no. 10, pp. 4394–4408, Aug. 2016. [29] C. Ye, G. Ozcan, M. C. Gursoy, and S. Velipasalar, “Multimedia transmission over cognitive radio channels under sensing uncertainty,” IEEE Trans. Signal Processing, vol. 64, no. 3, pp. 726–741, Feb. 2016. [30] Y. Han, A. Pandharipande, and S. H. Ting, “Cooperative decode-and-forward relaying for secondary spectrum access,” IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 4945–4950, Oct. 2009. [31] M. Chraiti, H. Hakim, W. Ajib, and H. Boujemaa, “Spectrum sharing techniques for broadcast cognitive radio networks,” IEEE Trans. Wireless Commun., vol. 12, no. 11, pp. 5880–5888, Nov. 2013. [32] L. Liang, F. Khanb, M. Pesaventoa, T. Ratnarajahc, and S. Prakriyad, “Sequential search based power allocation and beamforming design in overlay cognitive radio networks,” ELSEVIER Signal Processing, vol. 97, pp. 221–231, Apr. 2014. [33] L. Li, and et.al., “Energy-efficient transmission for protection of incumbent users,” IEEE Trans. Broadcast., vol. 57, no. 3, pp. 718–720, Sep. 2011. [34] J. Park and S. Lee, “MIMO beamforming for QoS enhancement via analog, digital and hybrid relaying,” IEEE Trans. Broadcast., vol. 56, no. 4, pp. 493–503, Dec. 2010. [35] R. Changiz, H. Halabian, F. R. Yu, I. Lambadaris, and H. Tang, “Trust establishment in cooperative wireless relaying networks,” Wireless Commun. Mobile Comput., vol. 14, no. 15, pp. 1450–1470, Oct. 2014.
|