{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T07:10:40Z","timestamp":1726384240767},"reference-count":36,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100004681","name":"Higher Education Commission, Pakistan","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004681","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Physical Communication"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1016\/j.phycom.2021.101275","type":"journal-article","created":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T03:41:01Z","timestamp":1610682061000},"page":"101275","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":18,"special_numbering":"C","title":["D2D-enabled resource management in secrecy-ensured 5G and beyond Heterogeneous networks"],"prefix":"10.1016","volume":"45","author":[{"given":"Fauzia","family":"Irrum","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8402-5920","authenticated-orcid":false,"given":"Mudassar","family":"Ali","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9734-4608","authenticated-orcid":false,"given":"Muhammad","family":"Naeem","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6646-6052","authenticated-orcid":false,"given":"Alagan","family":"Anpalagan","sequence":"additional","affiliation":[]},{"given":"Saad","family":"Qaisar","sequence":"additional","affiliation":[]},{"given":"Farhan","family":"Qamar","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.phycom.2021.101275_b1","series-title":"A Survey on 5G Usage Scenarios and Traffic Models","author":"Navarro\u00a0Ortiz","year":"2020"},{"issue":"3","key":"10.1016\/j.phycom.2021.101275_b2","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.1109\/COMST.2016.2532458","article-title":"Next generation 5G wireless networks: A comprehensive survey","volume":"18","author":"Agiwal","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.phycom.2021.101275_b3","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2020.2969980","article-title":"Combination of ultra-dense networks and other 5G enabling technologies: A survey","author":"Adedoyin","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.phycom.2021.101275_b4","doi-asserted-by":"crossref","first-page":"24956","DOI":"10.1109\/ACCESS.2019.2899254","article-title":"Security and protocol exploit analysis of the 5G specifications","volume":"7","author":"Jover","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.phycom.2021.101275_b5","series-title":"IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS","first-page":"1","article-title":"Wireless physical-layer identification assisted 5G network security","author":"Chang","year":"2019"},{"key":"10.1016\/j.phycom.2021.101275_b6","series-title":"2020 Fourth International Conference on Computing Methodologies and Communication, ICCMC","first-page":"75","article-title":"Network slicing in 5G and the security concerns","author":"Mathew","year":"2020"},{"issue":"2","key":"10.1016\/j.phycom.2021.101275_b7","doi-asserted-by":"crossref","first-page":"1773","DOI":"10.1109\/COMST.2018.2878035","article-title":"Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey","volume":"21","author":"Hamamreh","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"5","key":"10.1016\/j.phycom.2021.101275_b8","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MWC.001.1900048","article-title":"Physical layer security by exploiting interference and heterogeneous signaling","volume":"26","author":"Nasir","year":"2019","journal-title":"IEEE Wirel. Commun."},{"issue":"1","key":"10.1016\/j.phycom.2021.101275_b9","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1109\/COMST.2016.2598968","article-title":"Physical layer security for next generation wireless networks: Theories, technologies, and challenges","volume":"19","author":"Liu","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"4","key":"10.1016\/j.phycom.2021.101275_b10","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1109\/JSAC.2018.2825560","article-title":"A survey of physical layer security techniques for 5G wireless networks and challenges ahead","volume":"36","author":"Wu","year":"2018","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"2","key":"10.1016\/j.phycom.2021.101275_b11","doi-asserted-by":"crossref","first-page":"1878","DOI":"10.1109\/COMST.2018.2883144","article-title":"A survey of optimization approaches for wireless physical layer security","volume":"21","author":"Wang","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.phycom.2021.101275_b12","article-title":"A survey on security and privacy of 5G technologies: Potential solutions, recent advancements and future directions","author":"Khan","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.phycom.2021.101275_b13","series-title":"MILCOM 2019-2019 IEEE Military Communications Conference, MILCOM","first-page":"1","article-title":"On the application of key-based physical layer security in 5G heterogeneous networks","author":"Yerrapragada","year":"2019"},{"key":"10.1016\/j.phycom.2021.101275_b14","series-title":"2019 Eleventh International Conference on Ubiquitous and Future Networks, ICUFN","first-page":"164","article-title":"Secure user association in ultra dense heterogeneous cellular networks with non-uniformly distributed eavesdroppers","author":"Su","year":"2019"},{"key":"10.1016\/j.phycom.2021.101275_b15","doi-asserted-by":"crossref","first-page":"2840","DOI":"10.1109\/TIFS.2020.2976961","article-title":"Enhancing physical layer security of random caching in large-scale multi-antenna heterogeneous wireless networks","volume":"15","author":"Wen","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.phycom.2021.101275_b16","article-title":"PLS analysis in an indoor heterogeneous VLC\/RF network based on known and unknown CSI","author":"Kumar","year":"2020","journal-title":"IEEE Syst. J."},{"issue":"3","key":"10.1016\/j.phycom.2021.101275_b17","doi-asserted-by":"crossref","first-page":"2011","DOI":"10.1109\/COMST.2018.2803740","article-title":"How can heterogeneous Internet of Things build our future: A survey","volume":"20","author":"Qiu","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"10.1016\/j.phycom.2021.101275_b18","doi-asserted-by":"crossref","first-page":"3014","DOI":"10.1109\/JIOT.2018.2878511","article-title":"Resource management in multicloud IoT radio access network","volume":"6","author":"Awais","year":"2018","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"10.1016\/j.phycom.2021.101275_b19","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1049\/iet-com.2018.5570","article-title":"Physical layer security in massive Internet of Things: Delay and security analysis","volume":"13","author":"Zhang","year":"2018","journal-title":"IET Commun."},{"key":"10.1016\/j.phycom.2021.101275_b20","doi-asserted-by":"crossref","first-page":"54508","DOI":"10.1109\/ACCESS.2019.2913438","article-title":"Enhancing information security via physical layer approaches in heterogeneous IoT with multiple access mobile edge computing in smart city","volume":"7","author":"Wang","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.phycom.2021.101275_b21","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2019.102481","article-title":"A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT","volume":"149","author":"Sengupta","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"10.1016\/j.phycom.2021.101275_b22","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1109\/LWC.2018.2794353","article-title":"Energy-and spectral-efficiency trade-off for D2D-multicasts in underlay cellular networks","volume":"7","author":"Bhardwaj","year":"2018","journal-title":"IEEE Wirel. Commun. Lett."},{"issue":"4","key":"10.1016\/j.phycom.2021.101275_b23","first-page":"16","article-title":"Energy efficiency and spectrum efficiency in underlay device-to-device communications enabled cellular networks","volume":"16","author":"Cai","year":"2019","journal-title":"China Commun."},{"key":"10.1016\/j.phycom.2021.101275_b24","doi-asserted-by":"crossref","first-page":"16940","DOI":"10.1109\/ACCESS.2019.2894003","article-title":"A two-stage energy-efficient approach for joint power control and channel allocation in D2D communication","volume":"7","author":"Liu","year":"2019","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.phycom.2021.101275_b25","doi-asserted-by":"crossref","first-page":"946","DOI":"10.1109\/JSAC.2018.2825484","article-title":"Resource management for device-to-device communication: A physical layer security perspective","volume":"36","author":"Wang","year":"2018","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"2","key":"10.1016\/j.phycom.2021.101275_b26","doi-asserted-by":"crossref","first-page":"1822","DOI":"10.1109\/TVT.2016.2566298","article-title":"Secrecy-optimized resource allocation for device-to-device communication underlaying heterogeneous networks","volume":"66","author":"Zhang","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.phycom.2021.101275_b27","series-title":"2018 IEEE Conference on Communications and Network Security, CNS","first-page":"1","article-title":"Social-aware jamming allocation for physical-layer security in D2D multicast network","author":"Yan","year":"2018"},{"key":"10.1016\/j.phycom.2021.101275_b28","doi-asserted-by":"crossref","first-page":"43052","DOI":"10.1109\/ACCESS.2019.2905581","article-title":"An extensive game-based resource allocation for securing D2D underlay communications","volume":"7","author":"Rudenko","year":"2019","journal-title":"IEEE Access"},{"issue":"6","key":"10.1016\/j.phycom.2021.101275_b29","doi-asserted-by":"crossref","first-page":"4118","DOI":"10.1109\/TWC.2018.2820693","article-title":"Socially aware secrecy-ensured resource allocation in D2D underlay communication: An overlapping coalitional game scheme","volume":"17","author":"Ahmed","year":"2018","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"5","key":"10.1016\/j.phycom.2021.101275_b30","doi-asserted-by":"crossref","first-page":"4933","DOI":"10.1109\/TVT.2019.2890879","article-title":"Secrecy ensured socially aware resource allocation in device-to-device communications underlaying hetnet","volume":"68","author":"Ahmed","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"3","key":"10.1016\/j.phycom.2021.101275_b31","doi-asserted-by":"crossref","first-page":"3021","DOI":"10.1109\/TVT.2020.2966637","article-title":"Power allocation for intelligent interference exploitation aided physical-layer security in OFDM-based heterogeneous cellular networks","volume":"69","author":"Jiang","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"12","key":"10.1016\/j.phycom.2021.101275_b32","doi-asserted-by":"crossref","first-page":"11694","DOI":"10.1109\/TVT.2018.2873139","article-title":"Security-aware proportional fairness resource allocation for cognitive heterogeneous networks","volume":"67","author":"Xu","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"10.1016\/j.phycom.2021.101275_b33","doi-asserted-by":"crossref","first-page":"1388","DOI":"10.1109\/TCOMM.2018.2878767","article-title":"Security-aware cross-layer resource allocation for heterogeneous wireless networks","volume":"67","author":"Xu","year":"2018","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/j.phycom.2021.101275_b34","series-title":"2019 IEEE 90th Vehicular Technology Conference, VTC2019-Fall","first-page":"1","article-title":"On achieving high PHY-layer security of D2D-enabled heterogeneous networks","author":"Liu","year":"2019"},{"key":"10.1016\/j.phycom.2021.101275_b35","doi-asserted-by":"crossref","first-page":"43990","DOI":"10.1109\/ACCESS.2018.2862920","article-title":"Energy efficient resource allocation for energy harvesting aided H-CRAN","volume":"6","author":"Chughtai","year":"2018","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.phycom.2021.101275_b36","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/BF02592064","article-title":"An outer-approximation algorithm for a class of mixed-integer nonlinear programs","volume":"36","author":"Duran","year":"1986","journal-title":"Math. Program."}],"container-title":["Physical Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1874490721000124?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1874490721000124?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,4,16]],"date-time":"2023-04-16T06:30:43Z","timestamp":1681626643000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1874490721000124"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":36,"alternative-id":["S1874490721000124"],"URL":"https:\/\/doi.org\/10.1016\/j.phycom.2021.101275","relation":{},"ISSN":["1874-4907"],"issn-type":[{"value":"1874-4907","type":"print"}],"subject":[],"published":{"date-parts":[[2021,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"D2D-enabled resource management in secrecy-ensured 5G and beyond Heterogeneous networks","name":"articletitle","label":"Article Title"},{"value":"Physical Communication","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.phycom.2021.101275","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"101275"}}