Downloads: 111 | Views: 272
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015 | Popularity: 6.7 / 10
A Device to Device Communication with Trusted Node Mapping in Cellular Network
Vivek Kumar Sinha, Kedarnath Singh
Abstract: After the worldwide resolution of cellular technology, the communication protocols started Fifth Generation (5G) to come out. The previous generations of cellular technology have been a major transforming term that has covered all the backwards deficiency one by one. And 5G will need to be a major shift that includes very high carrier frequencies with massive bandwidths and extreme base station scalability. The outlook towards 5G is much higher as well as better in terms of capacity, bandwidth and throughput as compared with Fourth Generation (4G). But this technology also faces the major challenges like Device to Device (D2D) communication protocols, efficient energy schemes, pervasiveness and autonomous management [1]. In this paper, we propose a security framework to measure and evaluate trust model, trust propagation, and defend trust evaluation systems against malicious nodes. Our security technique is assessed by its ability to detect and isolate compromised nodes over the network. Simulation result indicates that our system effectively detects and prevents malicious nodes in cellular network.
Keywords: 5G, D2D, Trust Node, LTE and Wi -Max
Edition: Volume 4 Issue 9, September 2015
Pages: 1827 - 1832
Make Sure to Disable the Pop-Up Blocker of Web Browser