期刊文献+

异构网络中支持终端直通的联合模式资源复用算法 被引量:4

A resource reuse algorithm for device-to-device communication based on combination mode in heterogeneous networks
在线阅读 下载PDF
导出
摘要 针对异构蜂窝网络中终端直通(D2D)通信复用频谱资源导致同频干扰,并影响系统通信性能的问题,提出了一种基于联合模式的支持终端直通的资源复用算法.为了综合考虑异构网络中蜂窝用户和D2D用户需要并平衡两类不同用户的资源分配,该算法在确定D2D通信限制距离的基础上,联合蜂窝与D2D两种模式构建CU-D2D组合集,以其加权吞吐量增益为用户优先级,并据此进行无线资源分配,从而实现了异构蜂窝网络环境下频谱资源的优化分配.结果表明,该算法在保证蜂窝用户传输速率的同时,有效地改善了D2D用户的通信速率,从而整体性地提升了异构蜂窝网络的系统通信性能. Aiming at the problem that the reuse of spectrum resources in the device-to-device (D2D) communication leads to the same-frequency interference in the heterogeneous cellular networks and affects the communication performance of the system, a resource reuse algorithm for the device-to-device communication based on the combination mode was proposed. In order to comprehensively consider the needs of both cellular and D2D users in the heterogeneous networks and balance the resource allocation between two kinds of different users, the CU-D2D combination set was established with the proposed algorithm through combining the cellular and D2D modes based on determining the limiting distance of D2D communication. In addition, the weighted throughput gain of combination set was taken as the user priority, based on which the combination set of wireless resources was performed. Therefore, the optimal allocation of spectrum resources in the cellular heterogeneous network environment was realized. The results show that the proposed algorithm can not only ensure the transmission rate of cellular users, but also effectively improve the transmission rate of D2D users, and thus the algorithm can integrally improve the system communication performance of cellular heterogeneous networks.
出处 《沈阳工业大学学报》 EI CAS 北大核心 2017年第4期422-427,共6页 Journal of Shenyang University of Technology
基金 国家自然科学基金资助项目(61163066 71561025) 新疆高校科研计划培育项目(XJUEDU2014S042) 新疆自然科学基金资助项目(2013211A032)
关键词 终端直通通信 用户优先级 蜂窝通信 资源分配 联合模式 资源复用 异构网络 device-to-device communication user priority cellular communication resource allocation combination mode resource reuse heterogeneous network
  • 相关文献

参考文献3

二级参考文献28

  • 1刘宴兵,刘飞飞.基于云计算的智能手机社交认证系统[J].通信学报,2012,33(S1):28-34. 被引量:7
  • 2Papacharissi Z. A networked self: identity, communi- ty, and culture on social network sites [ M ]. New York : Routledge, 2011.
  • 3Brainard J, Juels A, Rivest R L, et al. Fourth-factor authentication : somebody you know [ C ]//13 th ACM Conference on Computer and Communications Securi- ty. Virginia,USA,2006 : 168 - 178.
  • 4Henk C A, van Tilborg, Jajodia S. Encyclopedia of cryptography and security [M]. New York: Springer US ,2011.
  • 5al Abdulwahid A,Clarke N, Furnell S, et al. The cur- rent use of authentication technologies: an investigative review [ C]//2015 IEEE International Conference on Cloud Computing. Riyadh, Saudi Arabia ,2015 : 1 - 8.
  • 6Javed A, Bletgen D, Kohlar F, et al. Secure fallback authentication and the trusted friend attack [ C]//2014 IEEE 34th International Conference on Distributed Computing Systems Workshops. Madrid, Spain ,2014: 22 - 28.
  • 7Schechter S,Egelman S, Reeder R W. It' s not what you know, but who you know [ C ]//Proceedings of the 27th ACM SIGCHI Conference on Human Factors in Computing Systems. Toronto, Canada, 2009 : 172 -181.
  • 8Shao C, Chert L, Fan S, et al. Social authentication identity: an alternate to internet real name system [ C ]//International Conference on Security and Priva- cy in Communication Systems. Beijing, China, 2014: 132 - 140.
  • 9Soleymani B, Maheswaran M. Social authentication protocol for mobile phones [ C ]//2009 International Conference on Computational Science and Engineer- ing. Vancouver, Canada,2009:436 - 441.
  • 10Jain S, Lang J, Gong N Z, et al. New directions in so- cial authentication [ C]//2015 Workshop on Usable Security. San Diego, USA,2015 : 1 - 6.

共引文献15

同被引文献33

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部