A Device to Device Communication with Trusted Node Mapping in Cellular Network
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 9)Publication Date: 2015-09-05
Authors : Vivek Kumar Sinha; Kedarnath Singh;
Page : 1827-1832
Keywords : 5G; D2D; Trust Node; LTE and Wi -Max;
Abstract
After the worldwide resolution of cellular technology, the communication protocols started Fifth Generation (5G) to come out. The previous generations of cellular technology have been a major transforming term that has covered all the backwards deficiency one by one. And 5G will need to be a major shift that includes very high carrier frequencies with massive bandwidths and extreme base station scalability. The outlook towards 5G is much higher as well as better in terms of capacity, bandwidth and throughput as compared with Fourth Generation (4G). But this technology also faces the major challenges like Device to Device (D2D) communication protocols, efficient energy schemes, pervasiveness and autonomous management [1]. In this paper, we propose a security framework to measure and evaluate trust model, trust propagation, and defend trust evaluation systems against malicious nodes. Our security technique is assessed by its ability to detect and isolate compromised nodes over the network. Simulation result indicates that our system effectively detects and prevents malicious nodes in cellular network.
Other Latest Articles
- In Vitro Leishmanicital Activity of Momordicafoetida against Leishmania Major
- Comparative Review of Surrogacy Laws in India and Abroad
- Alterations Induced in Gills of Xiphophorus maculates in Response to Petroleum Toxicity
- Bayesian and Non Bayesian Estimations for Birnbaum-Saunders Distribution under Partially Accelerated Life Testing Based on Censoring Sampling
- Analysis of Radicular Dental Calcifications According to the Numeral Prevalence
Last modified: 2021-06-30 21:53:24