{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,10,2]],"date-time":"2022-10-02T04:47:36Z","timestamp":1664686056599},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T00:00:00Z","timestamp":1570838400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T00:00:00Z","timestamp":1570838400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"TEQIP-III","award":["SMVDU"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s11276-019-02147-8","type":"journal-article","created":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T14:03:38Z","timestamp":1570889018000},"page":"3227-3244","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Dispersed beamforming approach for secure communication in UDN"],"prefix":"10.1007","volume":"26","author":[{"given":"Garima","family":"Chopra","sequence":"first","affiliation":[]},{"given":"Rakesh Kumar","family":"Jha","sequence":"additional","affiliation":[]},{"given":"Sanjeev","family":"Jain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,12]]},"reference":[{"key":"2147_CR1","unstructured":"Paper, W. (2018). Cisco ultra 5G packet core solution."},{"issue":"1","key":"2147_CR2","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MWC.2016.1500184WC","volume":"24","author":"Y Wang","year":"2017","unstructured":"Wang, Y., et al. (2017). A data-driven architecture for personalized QoE management in 5G wireless networks. IEEE Wireless Communications,24(1), 102\u2013110.","journal-title":"IEEE Wireless Communications"},{"issue":"8","key":"2147_CR3","doi-asserted-by":"publisher","first-page":"3693","DOI":"10.1109\/TVT.2012.2209692","volume":"61","author":"R Zhang","year":"2012","unstructured":"Zhang, R., Song, L., Han, Z., & Jiao, B. (2012). Physical layer security for two-way untrusted relaying with friendly jammers. IEEE Transactions on Vehicular Technology,61(8), 3693\u20133704.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"4","key":"2147_CR4","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MWC.2016.7553031","volume":"23","author":"Z Su","year":"2016","unstructured":"Su, Z., Hui, Y., & Guo, S. (2016). D2D-based content delivery with parked vehicles in vehicular social networks. IEEE Wireless Communications,23(4), 90\u201395.","journal-title":"IEEE Wireless Communications"},{"issue":"4","key":"2147_CR5","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MWC.2016.7553022","volume":"23","author":"L Jiang","year":"2016","unstructured":"Jiang, L., et al. (2016). Social-aware energy harvesting device-to-device communications in 5G networks. IEEE Wireless Communications,23(4), 20\u201327.","journal-title":"IEEE Wireless Communications"},{"issue":"7","key":"2147_CR6","doi-asserted-by":"publisher","first-page":"6461","DOI":"10.1109\/TVT.2016.2630300","volume":"66","author":"Z Su","year":"2017","unstructured":"Su, Z., Xu, Q., Hui, Y., Wen, M., & Guo, S. (2017). A game theoretic approach to parked vehicle assisted content delivery in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology,66(7), 6461\u20136474.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"5","key":"2147_CR7","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCOM.2014.6815890","volume":"52","author":"A Osseiran","year":"2014","unstructured":"Osseiran, A., et al. (2014). Scenarios for 5G mobile and wireless communications: The vision of the METIS project. IEEE Communications Magazine,52(5), 26\u201335.","journal-title":"IEEE Communications Magazine"},{"issue":"4","key":"2147_CR8","doi-asserted-by":"publisher","first-page":"2522","DOI":"10.1109\/COMST.2016.2571730","volume":"18","author":"M Kamel","year":"2016","unstructured":"Kamel, M., Hamouda, W., & Youssef, A. (2016). Ultra-dense networks: A survey. IEEE Communications Surveys & Tutorials,18(4), 2522\u20132545.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"4","key":"2147_CR9","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MCOM.2015.7081072","volume":"53","author":"X Duan","year":"2015","unstructured":"Duan, X., & Wang, X. (2015). Authentication handover and privacy protection in 5G hetnets using software-defined networking. IEEE Communications Magazine,53(4), 28\u201335.","journal-title":"IEEE Communications Magazine"},{"issue":"2","key":"2147_CR10","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MWC.2011.5751298","volume":"18","author":"YS Shiu","year":"2011","unstructured":"Shiu, Y. S., Chang, S. Y., Wu, H. C., Huang, S. C. H., & Chen, H. H. (2011). Physical layer security in wireless networks: A tutorial. IEEE Wireless Communications,18(2), 66\u201374.","journal-title":"IEEE Wireless Communications"},{"key":"2147_CR11","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.jnca.2017.07.007","volume":"95","author":"G Chopra","year":"2017","unstructured":"Chopra, G., Jha, R. K., & Jain, S. (2017). A survey on ultra-dense network and emerging technologies: Security challenges and possible solutions. Journal of Network and Computer Applications,95, 54\u201378.","journal-title":"Journal of Network and Computer Applications"},{"issue":"3","key":"2147_CR12","doi-asserted-by":"publisher","first-page":"2178","DOI":"10.1109\/TVT.2017.2765004","volume":"67","author":"G Chopra","year":"2018","unstructured":"Chopra, G., Jain, S., & Jha, R. K. (2018). Possible security attack modeling in ultradense networks using high-speed handover management. IEEE Transactions on Vehicular Technology,67(3), 2178\u20132192.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2147_CR13","doi-asserted-by":"crossref","unstructured":"Sivanesan, K., Zou, J., Vasudevan, S., & Palat, S. (2015). Mobility performance optimization for 3GPP LTE HetNets. In Design and deployment of small cell networks (pp. 1\u201330).","DOI":"10.1017\/CBO9781107297333.002"},{"issue":"2","key":"2147_CR14","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1109\/COMST.2015.2504600","volume":"18","author":"S Kutty","year":"2016","unstructured":"Kutty, S., & Sen, D. (2016). Beamforming for millimeter wave communications: An inclusive survey. IEEE Communications Surveys & Tutorials,18(2), 949\u2013973.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"12","key":"2147_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/CC.2017.8246328","volume":"14","author":"L Sun","year":"2017","unstructured":"Sun, L., & Du, Q. (2017). Physical layer security with its applications in 5G networks: A review. China Communications,14(12), 1\u201314.","journal-title":"China Communications"},{"issue":"6","key":"2147_CR16","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1109\/JSAC.2015.2416984","volume":"33","author":"T Lv","year":"2015","unstructured":"Lv, T., Gao, H., & Yang, S. (2015). Secrecy transmit beamforming for heterogeneous networks. IEEE Journal on Selected Areas in Communications,33(6), 1154\u20131170.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"2","key":"2147_CR17","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1109\/TWC.2016.2633351","volume":"16","author":"Y Zhang","year":"2017","unstructured":"Zhang, Y., Ko, Y., Woods, R., & Marshall, A. (2017). Defining spatial secrecy outage probability for exposure region-based beamforming. IEEE Transactions on Wireless Communications,16(2), 900\u2013912.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"4","key":"2147_CR18","doi-asserted-by":"publisher","first-page":"1117","DOI":"10.1109\/TPDS.2014.2316155","volume":"26","author":"B Han","year":"2015","unstructured":"Han, B., Li, J., Su, J., Guo, M., & Zhao, B. (2015). Secrecy capacity optimization via cooperative relaying and jamming for WANETs. IEEE Transactions on Parallel and Distributed Systems,26(4), 1117\u20131128.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"2147_CR19","doi-asserted-by":"crossref","unstructured":"Costello, D. J. (2009) Fundamentals of wireless communication (Tse, D. and Viswanath, P.) [book review], 55(2).","DOI":"10.1109\/TIT.2008.2009814"},{"key":"2147_CR20","doi-asserted-by":"crossref","unstructured":"Barros, J., & Rodrigues, M. R. D. (2006). Secrecy capacity of wireless channels. In IEEE international symposium on information theory\u2014Proceedings (pp. 356\u2013360).","DOI":"10.1109\/ISIT.2006.261613"},{"issue":"6","key":"2147_CR21","doi-asserted-by":"publisher","first-page":"2470","DOI":"10.1109\/TIT.2008.921678","volume":"54","author":"Y Liang","year":"2008","unstructured":"Liang, Y., Poor, H. V., & Shamai, S. (2008). Secure communication over fading channels. IEEE Transactions on Information Theory,54(6), 2470\u20132492.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"10","key":"2147_CR22","doi-asserted-by":"publisher","first-page":"4687","DOI":"10.1109\/TIT.2008.928990","volume":"54","author":"PK Gopala","year":"2008","unstructured":"Gopala, P. K., Lai, L., & El Gamal, H. (2008). On the secrecy capacity of fading channels. IEEE Transactions on Information Theory,54(10), 4687\u20134698.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"4","key":"2147_CR23","doi-asserted-by":"publisher","first-page":"1678","DOI":"10.1109\/TVT.2013.2285244","volume":"63","author":"K Cumanan","year":"2014","unstructured":"Cumanan, K., Ding, Z., Sharif, B., Tian, G. Y., & Leung, K. K. (2014). Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper. IEEE Transactions on Vehicular Technology,63(4), 1678\u20131690.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"6","key":"2147_CR24","doi-asserted-by":"publisher","first-page":"2493","DOI":"10.1109\/TIT.2008.921879","volume":"54","author":"R Liu","year":"2008","unstructured":"Liu, R., Maric, I., Spasojevic, P., & Yates, R. D. (2008). Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions. IEEE Transactions on Information Theory,54(6), 2493\u20132507.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"2147_CR25","doi-asserted-by":"publisher","first-page":"1076","DOI":"10.1109\/TWC.2015.2482494","volume":"15","author":"J Choi","year":"2016","unstructured":"Choi, J. (2016). A robust beamforming approach to guarantee instantaneous secrecy rate. IEEE Transactions on Wireless Communications,15(2), 1076\u20131085.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"11","key":"2147_CR26","doi-asserted-by":"publisher","first-page":"10546","DOI":"10.1109\/TVT.2017.2734944","volume":"66","author":"K Xiong","year":"2017","unstructured":"Xiong, K., Wang, B., Jiang, C., & Liu, K. J. R. (2017). A broad beamforming approach for high-mobility communications. IEEE Transactions on Vehicular Technology,66(11), 10546\u201310550.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"3","key":"2147_CR27","doi-asserted-by":"publisher","first-page":"1835","DOI":"10.1109\/TVT.2015.2412152","volume":"65","author":"F Zhu","year":"2016","unstructured":"Zhu, F., & Yao, M. (2016). Improving physical-layer security for CRNs using SINR-based cooperative beamforming. IEEE Transactions on Vehicular Technology,65(3), 1835\u20131841.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"9","key":"2147_CR28","doi-asserted-by":"publisher","first-page":"8139","DOI":"10.1109\/TVT.2017.2681965","volume":"66","author":"ME Eltayeb","year":"2017","unstructured":"Eltayeb, M. E., Choi, J., Al-Naffouri, T. Y., & Heath, R. W. (2017). Enhancing secrecy with multiantenna transmission in millimeter wave vehicular communication systems. IEEE Transactions on Vehicular Technology,66(9), 8139\u20138151.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"4","key":"2147_CR29","doi-asserted-by":"publisher","first-page":"2780","DOI":"10.1109\/TWC.2015.2510635","volume":"15","author":"S Yan","year":"2016","unstructured":"Yan, S., & Malaney, R. (2016). Location-based beamforming for enhancing secrecy in rician wiretap channels. IEEE Transactions on Wireless Communications,15(4), 2780\u20132791.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"3","key":"2147_CR30","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1109\/TWC.2004.826332","volume":"3","author":"JA Tsai","year":"2004","unstructured":"Tsai, J. A., Buehrer, R. M., & Woerner, B. D. (2004). BER performance of a uniform circular array versus a uniform linear array in a mobile radio environment. IEEE Transactions on Wireless Communications,3(3), 695\u2013700.","journal-title":"IEEE Transactions on Wireless Communications"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-019-02147-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-019-02147-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-019-02147-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T15:27:46Z","timestamp":1664638066000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-019-02147-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,12]]},"references-count":30,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["2147"],"URL":"https:\/\/doi.org\/10.1007\/s11276-019-02147-8","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,12]]},"assertion":[{"value":"12 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}