Publication: Security Enhancement in Cellular Networks Employing D2D Friendly Jammer for V2V Communication
| dc.authorscopusid | 59757656300 | |
| dc.authorscopusid | 56784731000 | |
| dc.authorscopusid | 56576145100 | |
| dc.authorscopusid | 57206866080 | |
| dc.authorscopusid | 15833929800 | |
| dc.authorwosid | Jagatheesaperumal, Senthil Kumar/S-9258-2019 | |
| dc.authorwosid | Gupta, Akhil/Aae-5370-2020 | |
| dc.authorwosid | Kumar, Neeraj/L-3500-2016 | |
| dc.authorwosid | Tanwar, Sudeep/M-8515-2018 | |
| dc.authorwosid | Tanwar, Sudeep/Aai-6709-2020 | |
| dc.authorwosid | Akleylek, Sedat/D-2090-2015 | |
| dc.contributor.author | Kumar, J. Senthil | |
| dc.contributor.author | Gupta, Akhil | |
| dc.contributor.author | Tanwar, Sudeep | |
| dc.contributor.author | Kumar, Neeraj | |
| dc.contributor.author | Akleylek, Sedat | |
| dc.contributor.authorID | Gupta, Akhil/0000-0002-0054-3801 | |
| dc.contributor.authorID | Tanwar, Sudeep/0000-0002-1776-4651 | |
| dc.contributor.authorID | Kumar, Neeraj/0000-0002-3020-3947 | |
| dc.date.accessioned | 2025-12-11T01:27:48Z | |
| dc.date.issued | 2023 | |
| dc.department | Ondokuz Mayıs Üniversitesi | en_US |
| dc.department-temp | [Kumar, J. Senthil] Mepco Schlenk Engn Coll, Dept Elect & Commun Engn, Sivakasi, Tamil Nadu, India; [Gupta, Akhil] Lovely Profess Univ, Sch Elect & Elect Engn, Phagwara, Punjab, India; [Tanwar, Sudeep] Nirma Univ, Inst Technol, Dept Comp Sci & Engn, Ahmadabad, Gujarat, India; [Kumar, Neeraj] Thapar Inst Engn & Technol, Dept Comp Sci Engn, Patiala, Punjab, India; [Akleylek, Sedat] Ondokuz Mayis Univ, Dept Comp Engn, Samsun, Turkey | en_US |
| dc.description | Gupta, Akhil/0000-0002-0054-3801; Tanwar, Sudeep/0000-0002-1776-4651; Kumar, Neeraj/0000-0002-3020-3947; | en_US |
| dc.description.abstract | In this paper, the security aspects in the vehicle-to-vehicle (V2V) communication with the backbone cellular network is thoroughly investigated with the aid of a device-to-device (D2D) communication link that shares the spectral resources using the base station with multiple-antennas. With assumptions of authorized user's channel state information and by utilizing the maximal ratio transmission at the base station, derivation of ergodic secrecy capacity and ergodic capacity for the wiretap channel and D2D link respectively are derived. Existing works lacks to elaborate the impact of security and power optimization through D2D communications, particularly for V2V applications. This article also exhibits an easy and efficient method of power allocation to enhance the secrecy performance that satisfies the requirements of D2D transmission. Also, the Golden algorithm is derived to optimize the power allocation mechanism. Eventually, numerical results are presented to illustrate the advantages of our investigation by concluding that D2D communication's interference is taken as a friendly jammer to improve transmission security in mobile networks. The results emphasize the support of D2D interference for providing enhanced secrecy capacity for the wireless and wiretap channel with optimized power allocation targeted towards better V2V communication. | en_US |
| dc.description.sponsorship | Faculty of Mepco Schlenk Engineering College, Sivakasi, India; School of Electronics and Electrical Engineering, Lovely Professional University, Punjab, India | en_US |
| dc.description.sponsorship | The authors gratefully acknowledge the Management, and Faculty of Mepco Schlenk Engineering College, Sivakasi, India, and School of Electronics and Electrical Engineering, Lovely Professional University, Punjab, India for their support and extending necessary facilities to carry out this work. | en_US |
| dc.description.woscitationindex | Science Citation Index Expanded | |
| dc.identifier.doi | 10.1007/s10586-022-03551-0 | |
| dc.identifier.endpage | 878 | en_US |
| dc.identifier.issn | 1386-7857 | |
| dc.identifier.issn | 1573-7543 | |
| dc.identifier.issue | 2 | en_US |
| dc.identifier.scopus | 2-s2.0-85123481882 | |
| dc.identifier.scopusquality | Q1 | |
| dc.identifier.startpage | 865 | en_US |
| dc.identifier.uri | https://doi.org/10.1007/s10586-022-03551-0 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.12712/43938 | |
| dc.identifier.volume | 26 | en_US |
| dc.identifier.wos | WOS:000746774800002 | |
| dc.identifier.wosquality | Q1 | |
| dc.language.iso | en | en_US |
| dc.publisher | Springer | en_US |
| dc.relation.ispartof | Cluster Computing-The Journal of Networks Software Tools and Applications | en_US |
| dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
| dc.rights | info:eu-repo/semantics/closedAccess | en_US |
| dc.subject | Device-to-Device | en_US |
| dc.subject | Communication Architecture | en_US |
| dc.subject | Ergodic Secrecy Capacity | en_US |
| dc.subject | Security and Privacy | en_US |
| dc.subject | Vehicle-to-Vehicle | en_US |
| dc.title | Security Enhancement in Cellular Networks Employing D2D Friendly Jammer for V2V Communication | en_US |
| dc.type | Article | en_US |
| dspace.entity.type | Publication |
