2018
DOI: 10.1109/access.2018.2852727
|View full text |Cite
|
Sign up to set email alerts
|

Secure User Association in Two-Tier Heterogeneous Cellular Networks With In-Band Interference

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 23 publications
0
9
0
Order By: Relevance
“…There are a few recent research on secrecy oriented user association schemes in HCNs. Wang et al showed that a simple truncated user association scheme that assigns users to BSs whose transmitted signal strength must be above a given threshold can improve system secrecy throughput and secrecy probability [11]. Zhou et al showed that a non-best user association scheme that assigns a typical user to a non-best BS in terms of average received signal power can significantly improve secrecy probability [12].…”
Section: Related Work and Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…There are a few recent research on secrecy oriented user association schemes in HCNs. Wang et al showed that a simple truncated user association scheme that assigns users to BSs whose transmitted signal strength must be above a given threshold can improve system secrecy throughput and secrecy probability [11]. Zhou et al showed that a non-best user association scheme that assigns a typical user to a non-best BS in terms of average received signal power can significantly improve secrecy probability [12].…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…The aforementioned assumptions would require that this eavesdropper intercept and decrypt entire network traffic, regardless of its spatial location and physical characteristics. While it is reasonable to consider this as a worse-case scenario [9,11,17,34,35], in practical situations the eavesdropping capabilities of adversaries are limited and it is not possible for them to eavesdrop on all users. Then eavesdroppers have to make strategic decisions on which users they would like to eavesdrop on.…”
Section: Strategic Eavesdropping Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Association policies aiming at improving the network security have been investigated in [ 27 ]. The serving BS is selected as the one that provides the maximum secrecy rate in [ 27 , 28 ] while in [ 29 ] the maximum secure area.…”
Section: System Modelmentioning
confidence: 99%
“…In [ 27 ], the UE selects the BS that provides the highest secrecy rate, but inter-cell interference is not considered, while it is a basic element of UDNs. Differently in [ 28 ], in-band interference is considered and the maximum secrecy rate association is approximated using the Maclaurin formulation. In [ 29 ], the maximum secure area is considered.…”
Section: Introductionmentioning
confidence: 99%