{"id":"https://openalex.org/W2785332731","doi":"https://doi.org/10.1109/pimrc.2017.8292188","title":"Secrecy capacity analysis in D2D underlay cellular networks: Colluding eavesdroppers","display_name":"Secrecy capacity analysis in D2D underlay cellular networks: Colluding eavesdroppers","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2785332731","doi":"https://doi.org/10.1109/pimrc.2017.8292188","mag":"2785332731"},"language":"en","primary_location":{"id":"doi:10.1109/pimrc.2017.8292188","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc.2017.8292188","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080073323","display_name":"Satyanarayana Vuppala","orcid":"https://orcid.org/0000-0001-9909-5465"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":true,"raw_author_name":"Satyanarayana Vuppala","raw_affiliation_strings":["Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourgh"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourgh","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032243366","display_name":"Georges Kaddoum","orcid":"https://orcid.org/0000-0002-5025-6624"},"institutions":[{"id":"https://openalex.org/I9736820","display_name":"\u00c9cole de Technologie Sup\u00e9rieure","ror":"https://ror.org/0020snb74","country_code":"CA","type":"education","lineage":["https://openalex.org/I49663120","https://openalex.org/I9736820"]},{"id":"https://openalex.org/I159129438","display_name":"Universit\u00e9 du Qu\u00e9bec \u00e0 Montr\u00e9al","ror":"https://ror.org/002rjbv21","country_code":"CA","type":"education","lineage":["https://openalex.org/I159129438","https://openalex.org/I49663120"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Georges Kaddoum","raw_affiliation_strings":["ETS, University of Quebec, Montreal, Canada"],"affiliations":[{"raw_affiliation_string":"ETS, University of Quebec, Montreal, Canada","institution_ids":["https://openalex.org/I9736820","https://openalex.org/I159129438"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5080073323"],"corresponding_institution_ids":["https://openalex.org/I186903577"],"apc_list":null,"apc_paid":null,"fwci":0.5842,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.71609296,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.8379999399185181},{"id":"https://openalex.org/keywords/underlay","display_name":"Underlay","score":0.7239989042282104},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6905325651168823},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6768785715103149},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.6293384432792664},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.6109767556190491},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6082761883735657},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.5817034244537354},{"id":"https://openalex.org/keywords/telecommunications-link","display_name":"Telecommunications link","score":0.5693352222442627},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.5586531162261963},{"id":"https://openalex.org/keywords/path-loss","display_name":"Path loss","score":0.5223734974861145},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.507316529750824},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.37241026759147644},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.3413543701171875},{"id":"https://openalex.org/keywords/signal-to-noise-ratio","display_name":"Signal-to-noise ratio (imaging)","score":0.25746434926986694},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.24051392078399658},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2397790253162384},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20665207505226135},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11839437484741211},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11152735352516174}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.8379999399185181},{"id":"https://openalex.org/C2777679929","wikidata":"https://www.wikidata.org/wiki/Q7883709","display_name":"Underlay","level":3,"score":0.7239989042282104},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6905325651168823},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6768785715103149},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.6293384432792664},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.6109767556190491},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6082761883735657},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.5817034244537354},{"id":"https://openalex.org/C138660444","wikidata":"https://www.wikidata.org/wiki/Q5607897","display_name":"Telecommunications link","level":2,"score":0.5693352222442627},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.5586531162261963},{"id":"https://openalex.org/C194273485","wikidata":"https://www.wikidata.org/wiki/Q1478845","display_name":"Path loss","level":3,"score":0.5223734974861145},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.507316529750824},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.37241026759147644},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.3413543701171875},{"id":"https://openalex.org/C13944312","wikidata":"https://www.wikidata.org/wiki/Q7512748","display_name":"Signal-to-noise ratio (imaging)","level":2,"score":0.25746434926986694},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.24051392078399658},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2397790253162384},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20665207505226135},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11839437484741211},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11152735352516174},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/pimrc.2017.8292188","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc.2017.8292188","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"},{"id":"pmh:oai:espace2.etsmtl.ca:16800","is_oa":false,"landing_page_url":"http://espace2.etsmtl.ca/id/eprint/16800/","pdf_url":null,"source":{"id":"https://openalex.org/S4306402392","display_name":"Espace \u00c9TS (ETS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1341030882","host_organization_name":"Educational Testing Service","host_organization_lineage":["https://openalex.org/I1341030882"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Compte rendu de conf\u00e9rence"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1499798684","https://openalex.org/W2023639446","https://openalex.org/W2026566189","https://openalex.org/W2030608526","https://openalex.org/W2045907783","https://openalex.org/W2081450055","https://openalex.org/W2086582032","https://openalex.org/W2098855626","https://openalex.org/W2150166076","https://openalex.org/W2156214717","https://openalex.org/W2171001244","https://openalex.org/W2233856233","https://openalex.org/W2336650418","https://openalex.org/W2576157399"],"related_works":["https://openalex.org/W2053474224","https://openalex.org/W3017105299","https://openalex.org/W2783169577","https://openalex.org/W3040992693","https://openalex.org/W3158389024","https://openalex.org/W2293934321","https://openalex.org/W3024822261","https://openalex.org/W2482290523","https://openalex.org/W2485082337","https://openalex.org/W2963095252"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"an":[3],"investigation":[4],"of":[5,18,28,33,46,62,77,97,117],"the":[6,16,22,26,34,44,57,63,94,106,111,115],"secrecy":[7,31,65,112],"capacity":[8,32],"in":[9,43,88],"device-to-device":[10],"(D2D)":[11],"enabled":[12],"cellular":[13,38],"network":[14],"under":[15,114],"collusion":[17,116],"eavesdroppers.":[19,50,118],"We":[20],"provide":[21],"closed-form":[23],"expressions":[24],"for":[25,56],"probability":[27],"achieving":[29],"non-zero":[30],"downlink":[35],"channel":[36],"between":[37],"base-station":[39],"(BS)":[40],"and":[41,49,72,83],"user":[42],"presence":[45],"D2D":[47],"nodes":[48],"Furthermore,":[51],"two":[52],"techniques":[53],"are":[54],"used":[55],"simple":[58],"yet":[59],"exact":[60],"evaluation":[61],"average":[64],"rate":[66,113],"using":[67],"moment":[68],"generating":[69],"functions":[70],"with":[71],"without":[73],"interference.":[74],"The":[75],"impact":[76,110],"transmission":[78],"factors,":[79],"path":[80],"loss":[81],"exponents,":[82],"node":[84],"density":[85],"is":[86],"analysed":[87],"numerical":[89],"results.":[90],"In":[91],"contrast":[92],"to":[93],"general":[95],"notion":[96],"interference-aided":[98],"secure":[99],"communication,":[100],"it":[101],"has":[102],"been":[103],"shown":[104],"that":[105],"interference":[107],"does":[108],"not":[109]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
