Downloads: 111
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015
A Device to Device Communication with Trusted Node Mapping in Cellular Network
Vivek Kumar Sinha [2] | Kedarnath Singh
Abstract: After the worldwide resolution of cellular technology, the communication protocols started Fifth Generation (5G) to come out. The previous generations of cellular technology have been a major transforming term that has covered all the backwards deficiency one by one. And 5G will need to be a major shift that includes very high carrier frequencies with massive bandwidths and extreme base station scalability. The outlook towards 5G is much higher as well as better in terms of capacity, bandwidth and throughput as compared with Fourth Generation (4G). But this technology also faces the major challenges like Device to Device (D2D) communication protocols, efficient energy schemes, pervasiveness and autonomous management [1]. In this paper, we propose a security framework to measure and evaluate trust model, trust propagation, and defend trust evaluation systems against malicious nodes. Our security technique is assessed by its ability to detect and isolate compromised nodes over the network. Simulation result indicates that our system effectively detects and prevents malicious nodes in cellular network.
Keywords: 5G, D2D, Trust Node, LTE and Wi -Max
Edition: Volume 4 Issue 9, September 2015,
Pages: 1827 - 1832
Similar Articles with Keyword '5G'
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 695 - 698A Complete Guide to 5G
Saad Shah | Mukesh Patel
Downloads: 39
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021
Pages: 1663 - 1668PAPR Reduction in OFDM System using Clipping and Filtering based new Hybrid VLM Pre-Coded SLM
Muneeb Manzoor Bhat | Preeti Sondhi [7]