ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Device to Device Communication with Trusted Node Mapping in Cellular Network

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 9)

Publication Date:

Authors : ; ;

Page : 1827-1832

Keywords : 5G; D2D; Trust Node; LTE and Wi -Max;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

After the worldwide resolution of cellular technology, the communication protocols started Fifth Generation (5G) to come out. The previous generations of cellular technology have been a major transforming term that has covered all the backwards deficiency one by one. And 5G will need to be a major shift that includes very high carrier frequencies with massive bandwidths and extreme base station scalability. The outlook towards 5G is much higher as well as better in terms of capacity, bandwidth and throughput as compared with Fourth Generation (4G). But this technology also faces the major challenges like Device to Device (D2D) communication protocols, efficient energy schemes, pervasiveness and autonomous management [1]. In this paper, we propose a security framework to measure and evaluate trust model, trust propagation, and defend trust evaluation systems against malicious nodes. Our security technique is assessed by its ability to detect and isolate compromised nodes over the network. Simulation result indicates that our system effectively detects and prevents malicious nodes in cellular network.

Last modified: 2021-06-30 21:53:24