“…Furthermore, in [42], the SOP of a D2D hop can be replaced with the trusted probability to compute the secrecy levels of D2D MHMP communications in a similar vein with the work in [43]. And it is interesting that the PLS combined with cooperative beamforming strategy can improve the secrecy performance of D2D MHMP communications [44].…”
Section: Security Modelmentioning
confidence: 99%
“…Finally, together with optimal power allocated to the CHs for high energy efficiency, a path optimization problem is formulated and solved for finding the path with minimum end-to-end delay and longer network lifetime. Clustering, RS, and routing techniques have also been studied in [44,54,75]. However, the authors in these works further combined with the beamforming technique [44,75] and EH technique [54] at the relay nodes so as to improve the quality of received signal.…”
Section: Techniques For Establishing D2d Mhmp Communicationsmentioning
confidence: 99%
“…Further reactive caching techniques that are more efficient are required to study in the context of D2D MHMP communications. It means that 6 EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 10 2020 -01 2021 | Volume 7 | Issue 25 | e3 D2D Multi-hop Multi-path Communications in B5G Networks: A Survey on Models, Techniques, and Applications 22,33,34,36,37,40,44,63,64,66,75,86] [ 26,27,51,53,54,60,61,79,82,85,[87][88][89][90][91][92] [ [41][42][43]53] the contents are placed in the best SUs in advance, with a certain caching density based on a prediction model of content popularity. And then, whenever a DU requests the content, D2D MHMP D2D communications are immediately established to serve the DU.…”
Section: Techniques For Enhancing D2d Mhmp Communications Performancementioning
“…Furthermore, in [42], the SOP of a D2D hop can be replaced with the trusted probability to compute the secrecy levels of D2D MHMP communications in a similar vein with the work in [43]. And it is interesting that the PLS combined with cooperative beamforming strategy can improve the secrecy performance of D2D MHMP communications [44].…”
Section: Security Modelmentioning
confidence: 99%
“…Finally, together with optimal power allocated to the CHs for high energy efficiency, a path optimization problem is formulated and solved for finding the path with minimum end-to-end delay and longer network lifetime. Clustering, RS, and routing techniques have also been studied in [44,54,75]. However, the authors in these works further combined with the beamforming technique [44,75] and EH technique [54] at the relay nodes so as to improve the quality of received signal.…”
Section: Techniques For Establishing D2d Mhmp Communicationsmentioning
confidence: 99%
“…Further reactive caching techniques that are more efficient are required to study in the context of D2D MHMP communications. It means that 6 EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 10 2020 -01 2021 | Volume 7 | Issue 25 | e3 D2D Multi-hop Multi-path Communications in B5G Networks: A Survey on Models, Techniques, and Applications 22,33,34,36,37,40,44,63,64,66,75,86] [ 26,27,51,53,54,60,61,79,82,85,[87][88][89][90][91][92] [ [41][42][43]53] the contents are placed in the best SUs in advance, with a certain caching density based on a prediction model of content popularity. And then, whenever a DU requests the content, D2D MHMP D2D communications are immediately established to serve the DU.…”
Section: Techniques For Enhancing D2d Mhmp Communications Performancementioning
“…According to the author's worry the framework system contrasted with cooperative strategy (CS) calculation given in [22] like optional clients, utilizing hand-off choice, channel pick up and security. Here our paper introduces and examined proposed structure contrasted with existing development calculation is better.…”
In cognitive radio systems; primary clients can use auxiliary clients as agreeable transfers to expand their transmission rates while auxiliary clients will consequently acquire more range to get circumstances, prompting coordinated cognitive radio systems. Earlier research proposals in Coordinated Cognitive Radio Networks (CCRNs) predominantly concentrate on giving omnipresent access and high throughput primary client for clients yet have infrequently contemplated vitality proficiency. Moreover, most existing works expect that auxiliary clients are inactively chosen by primary clients, paying little respect to auxiliary client's eagerness to help, which is clearly not feasible. To address energy issue, this paper identifies an Energy-Efficient Cooperative Strategy (EECS) by leveraging temporal and spatial diversity of the primary network. In particular, auxiliary clients with delay-tolerant packets can proactively settle on the agreeable choices by together thinking about primary channel accessibility, channel state data, primary client's movement stack, and their own particular transmission necessities. Principle challenge for this cooperative relay determination issue is to choose a relay effectively and economically. Since the quantity of auxiliary clients is expanded step by step because of the quickly developing number of wireless communication gadgets, it is unfeasible to examine all the auxiliary clients and after that pick the best. Predominantly primary client transmitter successively watches auxiliary clients. An arrangement of auxiliary clients is chosen in view of transmission criteria. The hand-off choice plan selects the best hand-off from an arrangement of accessible transfers which are chosen in light of transmission criteria of coordinated connections. In the observation of a hand off primary client need to settle on choice in regards to whether to stop its observation and to pick that as best hand-off or to skip to see next transfer. This problem is addressed by optimal stopping theory and optimal stopping rule. To evaluate the performance of proposed scheme Optimal Selection Approach (OSA), it is compared with auxiliary client's energy efficient and existing cooperative schemes. Extensive simulation study is conducted so that impacts of different system parameters are investigated and algorithm proposed can satisfy different system requirements.
“…Thus, it is necessary to establish a communication network in such areas, and D2D communication could be a good solution 6,7 . The cognitive D2D approach is an innovative solution and has been recently proposed in a cellular network 8 . It means D2D users can detect CU's absence or presence in a CU's licensed band by using a spectrum sensing strategy.…”
Summary
In this paper, a multi‐hop cognitive radio (CR) enabled device‐to‐device (D2D) network is considered to extend the communication from a functional area (FA) to a non‐functional area (NFA). A D2D user utilizes a cellular user (CU) band in the cognitive mode for information transmission while maintaining the service quality of CUs by satisfying a collision constraint. It transmits with full power in overlay mode, while the power is controlled in underlay mode. We derive the outage probability of the considered D2D network. The main challenge in CR communications lies in the system robustness to uncertainties. In this paper, we also show the impact of the noise power uncertainty in a multi‐hop D2D network. The expressions for throughput and energy efficiency are also developed under collision constraint and noise uncertainty. The outage probability, throughput, and energy efficiency are investigated for several network parameters such as collision probability, sensing time, noise uncertainty, etc. It is observed that the collision constraint and noise uncertainty have significant impacts on network performance. A simulation test‐bed is developed in MATLAB, and the results obtained in the simulation are verified with the analytical results.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.