[1] |
MERSHAD K , ARYAIL H . A framework for secure and efficient data acquisition in vehicular Ad hoc networks[J]. IEEE Transac-tions on Vehicular Technology, 2013,62 (2):536-551.
|
[2] |
MUMTAZ S , SAIDUL HUP K M , ASHRAF M L , et al. Cognitive vehicular communication for 5G[J]. IEEE Communications Maga-zine, 2015,53 (7):109-117.
|
[3] |
VINEL A , MA X , HUANG D . Guest editors' introduction:special issue on reliable and secure VANETs[J]. IEEE Transactions on De-pendable & Secure Computing, 2016,13 (1):2-4.
|
[4] |
WANG C X , HAIDER F , GAO X Q , et al. Cellular architecture and key technologies for 5G wireless communication networks[J]. IEEE Communications Magazine, 2014,52 (2):122-130.
|
[5] |
TEHRANI M N , UYSAL M , YANIKOMEROGLU H . De-vice-to-device communication in 5G cellular networks:challenges,solutions,and future directions[J]. IEEE Communications Maga-zine, 2014,52 (5):86-92.
|
[6] |
OSSEIRAN A , BOCCARDI F , BRAUN V , et al. Scenarios for 5G mobile and wireless communications:the vision of the METIS project[J]. IEEE Communications Magazine, 2014,52 (5):26-35.
|
[7] |
QIAO J , SHEN X M , MARK J , et al. Enabling device-to-device communications in millimeter-wave 5G cellular networks[J]. IEEE Communications Magazine, 2015,53 (1):209-215.
|
[8] |
ENGOULOU R G , BELLAICHE M , PIERRE S , et al. VANET security surveys[J]. Computer Communications, 2014,44 (5):1-13.
|
[9] |
SHIVALDOVA V , SEPULCRE M , WINKELBAUER A , et al. A model for vehicle-to-infrastructure communications in urban envi-ronments[C]// IEEE International Conference on Communication Workshop (ICCW).c 2015:2387-2392.
|
[10] |
DAMMANN A , RAULEFS R , ZHANG S , et al. On prospects of positioning in 5G[C]// IEEE International Conference on Communica-tion Workshop (ICCW).c 2015:1207-1213.
|
[11] |
PHAN-HUY D , STERNAD M , SVENSSON T . Making 5G adap-tive antennas work for very fast moving vehicles[J]. Intelligent Transportation Systems Magazine, 2015,7 (2):71-84.
|
[12] |
HAIDER F , WANG H M , HAAS H , et al. Spectral efficiency analysis of mobile femtocell based cellular systems[C]// IEEE 13th International Conference on Communication Technology (ICCT).c 2011:347-351.
|
[13] |
RUSEK F , PERSSON D , BUON K L , et al. Scaling up MIMO:opportunities and challenges with very large arrays[J]. IEEE Signal Processing Magazine, 2013,30 (1):40-60.
|
[14] |
CATTONI A F , CHANDRAMOULI D , SARTORI C . Mobile low latency services in 5G[C]// IEEE 81st Vehicular Technology Con-ference (VTC Spring).c 2015:1-6.
|
[15] |
DUAN X Y , WANG X B . Authentication handover and privacy protection in 5G hetnets using software-defined networking[J]. IEEE Communications Magazine, 2015,53 (4):28-35.
|
[16] |
SHENG M , LI Y , WANG X , et al. Energy efficiency and delay tradeoff in device-to-device communications underlaying cellular networks[J]. IEEE Journal on Selected Areas in Communications, 2016,34 (1):92-106.
|
[17] |
ZHANG X , CHENG W C , ZHANG H L . Heterogeneous statistical QoS provisioning over 5G mobile wireless networks[J]. IEEE Network, 2014,28 (6):46-53.
|
[18] |
AKHTAR A M , WANG X , HANZO L . Synergistic spectrum shar-ing in 5G HetNets:a harmonized SDN-enabled approach[J]. IEEE Communications Magazine, 2016,54 (1):40-47.
|
[19] |
PATCHARAMANEEPAKORN P , WU S , WANG C X , et al. Spec-tral,energy and economic efficiency of 5G multi-cell massive mimo systems with generalized spatial modulation[J]. IEEE Trans-actions on Vehicular Technology, 2016:1.
|
[20] |
YANG H , MARZETTA T L . Performance of conjugate and zero-forcing beamforming in large-scale antenna systems[J]. IEEE Journal on Selected Areas in Communications, 2013,31 (2):172-179.
|
[21] |
BISWAS S , MASOUROS C , RATNARAJAH T . Performance analysis of large multi-user mimo systems with space-constrained 2D antenna arrays[J]. IEEE Transactions on Wireless Communica-tions, 2016:1.
|
[22] |
DOPPLER K , YU C H , RIBEIRO C B , et al. Mode selection for device-to-device communication underlaying an LTE-advanced network[J]. IEEE Xplore, 2010,29 (16):1-6.
|
[23] |
WEN S , ZHU X Y , LIN Y C , et al. Achievable transmission capac-ity of relay-assisted device-to-device (D2D) communication under-lay cellular networks[C]// IEEE Vehicular Technology Conference.c 2013:1-5.
|
[24] |
WOOSEOK N , DONGWOON B , JUNGWON L , et al. Advanced interference management for 5G cellular networks[J]. IEEE Com-munications Magazine, 2014,52 (5):52-60.
|
[25] |
MUMTAZ S , SAIDUL HUQ K M , RODRIGUEZ J . Direct mo-bile-to-mobile communication:Paradigm for 5G[J]. IEEE Wireless Communications, 2014,21 (5):14-23.
|
[26] |
REN Y , LIU F Q , LIU Z , et al. Power control in D2D-based ve-hicular communication networks[J]. IEEE Transactions on Vehicu-lar Technology, 2015,64 (12):5547-5562.
|
[27] |
GAO Z , HU Y , LU K . CPTIAS:a new fast PKI authentication scheme based on certificate path trust index[J]. Journal of Ambient Intelligence & Humanized Computing, 2015,6 (6):721-731.
|
[28] |
CALANDRIELLO G , PAPADIMITRATOS P , HUBAUX J P , et al. Efficient and robust pseudonymous authentication in VANET[C]// The 4th International Workshop on Vehicular Ad Hoc Networks,ACM.c 2007:19-28.
|
[29] |
ZHU X L , YANG L U , HOU Z F , et al. Strong privacy protection scheme based on oblivious transfer and group signature in VANET[J]. Application Research of Computers, 2014.
|
[30] |
YUE J T , MA C , YU H , et al. Secrecy-based access control for device-to-device communication underlaying cellular networks[J]. IEEE Communications Letters, 2013,17 (11):2068-2071.
|
[31] |
JUNG Y , FESTIJO E , PERADILLA M . Joint operation of routing control and group key management for 5G ad hoc D2D net-works[C]// International Conference on Privacy and Security in Mobile Systems (PRISMS).c 2014:1-8.
|
[32] |
GHANEM S , ARA M . Secure communications with D2D coopera-tion[C]// IEEE International Conference on Communications,Signal Processing,and their Applications (ICCSPA).c 2015:1-6.
|
[33] |
LIU Y L , WANG L M , CHEN H . Message authentication using proxy vehicles in vehicular ad hoc networks[J]. IEEE Transactions on Vehicular Technology, 2014,64 (8):3697-3710.
|
[34] |
LUO Y J , CUI L , YANG Y , et al. Power control and channel access for physical-layer security of D2D underlay communica-tion[C]// International Conference on Wireless Communications &Signal Processing (WCSP),IEEE.c 2015:1-5.
|
[35] |
KONG Z , YANG S , WU F , et al. Iterative distributed minimum total MSE approach for secure communications in MIMO interfer-ence channels[J]. IEEE Transactions on Information Forensics &Security, 2016,11 (3):594-608.
|
[36] |
BOGALE T E , LE L B . Massive MIMO and mmWave for 5G wireless HetNet:potential benefits and challenges[J]. IEEE Ve-hicular Technology Magazine, 2016,11 (1):64-75.
|
[37] |
LIU X , LI Z , LI W , et al. Exploring social properties in vehicular ad hoc networks[C]// The 4th Asia-Pacific Symposium on Internetware.c 2012:1-7.
|
[38] |
VEGNI A , LOSCRI V . A survey on vehicular social networks[J]. IEEE Communications Surveys & Tutorials, 2015,17 (4):2397-2419.
|