References
- T. Turinawe and I. Mukonyezi, "DEVICE TO DEVICE COMMUNICATION IN 5G TECHNOLOGY," no. August, 2017.
- O. Nait Hamoud, T. Kenaza, and Y. Challal, "Security in device-to-device communications: a survey," IET Networks, vol. 7, no. 1, pp. 14-22, 2018. https://doi.org/10.1049/iet-net.2017.0119
- N. Panwar, S. Sharma, and A. K. Singh, "A survey on 5G: The next generation of mobile communication," Phys. Commun., vol. 18, pp. 64-84, 2016. https://doi.org/10.1016/j.phycom.2015.10.006
- P. Gandotra and R. K. Jha, "Device-to-Device Communication in Cellular Networks: A Survey," J. Netw. Comput. Appl., vol. 71, no. 4, pp. 1801-1819, 2016.
- R. I. Ansari et al., "5G D2D Networks: Techniques, Challenges, and Future Prospects," IEEE Syst. J., vol. 12, no. 4, pp. 3970-3984, 2018. https://doi.org/10.1109/JSYST.2017.2773633
- U. N. Kar and D. K. Sanyal, "An overview of device-to-device communication in cellular networks," ICT Express, vol. 4, no. 4, pp. 203-208, 2018. https://doi.org/10.1016/j.icte.2017.08.002
- A. S. Khan, Y. Javed, J. Abdullah, J. M. Nazim, and N. Khan, "Security issues in 5G device to device communication," vol. 17, no. 5, pp. 366-375, 2017.
- V. Shrimali and A. Gaur, "A Review on Communication Infrastructures in 5G Cellular Networks," vol. II, no. Ii, pp. 94-98, 2015.
- A. Gupta, S. Member, R. K. Jha, and S. Member, "A survey of 5G network: Architecture and emerging technologies," IEEE access, vol. 3, 2015.
- C. H. Yu and O. Tirkkonen, "Device-to-device underlay cellular network based on rate splitting," IEEE Wirel. Commun. Netw. Conf. WCNC, pp. 262-266, 2012.
- Z. Liu, T. Peng, S. Xiang, and W. Wang, "Mode selection for Device-to-Device (D2D) communication under LTE-advanced networks," IEEE Int. Conf. Commun., pp. 5563-5567, 2012.
- K. Vanganuru, S. Ferrante, and G. Sternberg, "SYSTEM CAPACITY AND COVERAGE OF A CELLULAR NETWORK WITH D2D MOBILE RELAYS Outline.Background.D2D Mobile Relays.High Level Concepts.System Model.Performance Results.Conclusions," 2012.
- H. Cai, I. Koprulu, and N. B. Shroff, "Exploiting Double Opportunities for Latency-Constrained Content Propagation in Wireless Networks," IEEE/ACM Trans. Netw., vol. 24, no. 2, pp. 1025-1037, 2016. https://doi.org/10.1109/TNET.2015.2406573
- Y. Wu, W. Liu, S. Wang, W. Guo, and X. Chu, "Network coding in device-to-device (D2D) communications underlaying cellular networks," IEEE Int. Conf. Commun., vol. 2015-September, no. July, pp. 2072-2077, 2015.
- Y. Cao, T. Jiang, and C. Wang, "Cooperative device-to-device communications in cellular networks," IEEE Wirel. Commun., vol. 22, no. 3, pp. 124-129, 2015. https://doi.org/10.1109/MWC.2015.7143335
- A. H. Sakr and E. Hossain, "Cognitive and Energy Harvesting-Based D2D Communication in Cellular Networks: Stochastic Geometry Modeling and Analysis," IEEE Trans. Commun., vol. 63, no. 5, pp. 1867-1880, 2015. https://doi.org/10.1109/TCOMM.2015.2411266
- G. A. Shah and O. B. Akan, "Performance analysis of CSMA-based opportunistic medium access protocol in cognitive radio sensor networks," Ad Hoc Networks, vol. 15, pp. 4-13, 2014. https://doi.org/10.1016/j.adhoc.2013.03.014
- H. N. Abdulrazzak and A. A. Hussein, "Performance Analysis of CSMA/CA Based on D2D Communication," no. March, 2019.
- M. Wellens, J. Riihijarvi, and P. Mahonen, "Modelling primary system activity in dynamic spectrum access networks by aggregated ON/OFF-processes," 2009 6th IEEE Annu. Commun. Soc. Conf. Sensor, Mesh Ad Hoc Commun. Networks Work. SECON Work. 2009, 2009.
- F. F. Digham, M. S. Alouini, and M. K. Simon, "On the Energy Detection of Unknown Signals Over Fading Channels," Commun. IEEE Trans., vol. 55, no. 1, pp. 21-24, 2007. https://doi.org/10.1109/TCOMM.2006.887483
- W. Y. Lee and I. F. Akyildiz, "Optimal spectrum sensing framework for cognitive radio networks," IEEE Trans. Wirel. Commun., vol. 7, no. 10, pp. 3845-3857, 2008. https://doi.org/10.1109/T-WC.2008.070391
- M. Mi, "On the Capacity of p -Persistent CSMA," Int. J. Comput. Sci. Netw. Secur., vol. 7, no. 11, pp. 38-43, 2007.
- H. Zhao, E. Garcia-Palacios, J. Wei, and Y. Xi, "Accurate available bandwidth estimation in IEEE 802.11-based ad hoc networks," Comput. Commun., vol. 32, no. 6, pp. 1050-1057, 2009. https://doi.org/10.1016/j.comcom.2008.12.031
- J. D. C. Little, " A Proof for the Queuing Formula: L = λ W ," Oper. Res., vol. 9, no. 3, pp. 383-387, 1961. https://doi.org/10.1287/opre.9.3.383