References
Ma Z, Zhang Z Q, Ding Z G, et al. Key techniques for 5G wireless communications: network architecture, physical layer, and MAC layer perspectives. Sci China Inf Sci, 2015, 58: 041301
Huang X Q, Han T, Ansari N. On green-energypowered cognitive radio networks. IEEE Commun Surv Tuts, 2015, 17: 827–842
Wang H-M, Xia X-G. Enhancing wireless secrecy via cooperation: signal design and optimization. IEEE Commun Mag, 2015, 53: 47–53
Xu C, Zheng M, Liang W, et al. End-to-end throughput maximization for underlay multi-hop cognitive radio networks with RF energy harvesting. IEEE Trans Wirel Commun, 2017, 16: 3561–3572
Sakr A H, Hossain E. Cognitive and energy harvestingbased D2D communication in cellular networks: stochastic geometry modeling and analysis. IEEE Trans Commun, 2015, 63: 1867–1880
Wang W, Teh K C, Li K H. Enhanced physical layer security in D2D spectrum sharing networks. IEEE Wirel Commun Lett, 2017, 6: 106–109
Liu Y, Wang L, Zaidi S A R, et al. Secure D2D communication in large-scale cognitive cellular networks: a wireless power transfer model. IEEE Trans Commun, 2016, 64: 329–342
Palomar D P, Chiang M. A tutorial on decomposition methods for network utility maximization. IEEE J Sel Areas Commun, 2006, 24: 1439–1451
Acknowledgements
This work was supported by National Natural Science Foundation of China (Grant Nos. 61233007, 61533015, 71661147005).
Author information
Authors and Affiliations
Corresponding author
Additional information
The authors declare that they have no conflict of interest.
Rights and permissions
About this article
Cite this article
Xu, C., Zeng, P., Liang, W. et al. Secure resource allocation for green and cognitive device-to-device communication. Sci. China Inf. Sci. 61, 029305 (2018). https://doi.org/10.1007/s11432-016-9201-7
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-016-9201-7