International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064




Downloads: 111 | Views: 214

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015 | Rating: 6.7 / 10


A Device to Device Communication with Trusted Node Mapping in Cellular Network

Vivek Kumar Sinha [2] | Kedarnath Singh


Abstract: After the worldwide resolution of cellular technology, the communication protocols started Fifth Generation (5G) to come out. The previous generations of cellular technology have been a major transforming term that has covered all the backwards deficiency one by one. And 5G will need to be a major shift that includes very high carrier frequencies with massive bandwidths and extreme base station scalability. The outlook towards 5G is much higher as well as better in terms of capacity, bandwidth and throughput as compared with Fourth Generation (4G). But this technology also faces the major challenges like Device to Device (D2D) communication protocols, efficient energy schemes, pervasiveness and autonomous management [1]. In this paper, we propose a security framework to measure and evaluate trust model, trust propagation, and defend trust evaluation systems against malicious nodes. Our security technique is assessed by its ability to detect and isolate compromised nodes over the network. Simulation result indicates that our system effectively detects and prevents malicious nodes in cellular network.


Keywords: 5G, D2D, Trust Node, LTE and Wi -Max


Edition: Volume 4 Issue 9, September 2015,


Pages: 1827 - 1832


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top