Security issues in 5G device to device communication
5G is a promising technology that will support high connectivity and device to device communication. It also promises to improve the existing technologies and will support them. Existing LTE-A utilize centralized communication scheme where all the authentication mechanisms need to go through the bas...
| Main Authors: | Khan, A.S., Yasir, Javed, Johari, Abdullah, Nazim, J.M., Khan, N. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IJCSNS
2017
|
| Subjects: | |
| Online Access: | http://ir.unimas.my/id/eprint/17236/ http://ir.unimas.my/id/eprint/17236/1/Security%20issues%20in%205G%20device%20to%20device%20communication%20%28abstract%29.pdf |
Similar Items
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
Wireless network security: 3G, 4G, wireless PAN/LAN/MAN
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
Wireless Networks and Security: Issues, Challenges and Research Trends
by: Khan, Shafiullah, et al.
Published: (2012)
by: Khan, Shafiullah, et al.
Published: (2012)
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
Future trends in security issues in internet and web applications
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
Battery optimizer for android device
by: Noor Suzieana, Suhaimi
Published: (2019)
by: Noor Suzieana, Suhaimi
Published: (2019)
Drift management in ML-based IoT device classification: A survey and evaluation
by: Waseem, Quadri, et al.
Published: (2024)
by: Waseem, Quadri, et al.
Published: (2024)
GOPE: A MVC driven mobile framework using HTML5 for pervasive device container
by: Lim, Tong Ming *, et al.
Published: (2013)
by: Lim, Tong Ming *, et al.
Published: (2013)
Revolving traditional EEG device into mobile architecture
by: Muhd Adnan, Hafizuddin, et al.
Published: (2016)
by: Muhd Adnan, Hafizuddin, et al.
Published: (2016)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Android Botnets: A Serious Threat to Android Devices
by: Shahid, Anwar, et al.
Published: (2018)
by: Shahid, Anwar, et al.
Published: (2018)
Multicast security : issues and solutions
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
Sensorml-Nt: Innovative Cloud Service Sensor Description For Mobile Devices Handling Environmental Issues.
by: Yazdi, Nazi Tabatabaei
Published: (2011)
by: Yazdi, Nazi Tabatabaei
Published: (2011)
A survey and analysis of feature selection techniques in machine learning for IoT device classification within smart buildings
by: Waseem, Quadri, et al.
Published: (2025)
by: Waseem, Quadri, et al.
Published: (2025)
Object segmentation based on multi angle images on mobile device
by: Pong, Chang Sheng
Published: (2018)
by: Pong, Chang Sheng
Published: (2018)
Routing protocol design for secure WSN: Review and open research issues
by: Md Zin, Shazana, et al.
Published: (2014)
by: Md Zin, Shazana, et al.
Published: (2014)
Security Mechanism for MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Security Mechanism for MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
A lightweight process migration based computational offloading framework for mobile device augmentation / Abdullah
by: Abdullah, -
Published: (2017)
by: Abdullah, -
Published: (2017)
Blockchain Security Hole: Issues and Solutions
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
Measuring information contents quality of E-Services through mobile devices
by: Zamzami, Ikhlas, et al.
Published: (2011)
by: Zamzami, Ikhlas, et al.
Published: (2011)
Immunology Inspired Framework for Securing MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Framework for MANETs’ Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Mobile device forensics: extracting and analysing data from an android-based smartphone
by: Abdul Aziz, Normaziah, et al.
Published: (2016)
by: Abdul Aziz, Normaziah, et al.
Published: (2016)
Unveiling the support of 3D representation in mobile devices for pedestrians navigation aid
by: Abubakar, Adamu, et al.
Published: (2012)
by: Abubakar, Adamu, et al.
Published: (2012)
Press Code: A Shoulder Surfing Resistant Authentication Scheme for Smart Devices
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
Resource Aware Application for Mobile Device In An Ad Hoc Wireless Network Environment
by: Saaya, Zurina, et al.
Published: (2010)
by: Saaya, Zurina, et al.
Published: (2010)
Immune-Inspired Framework for securing Hybrid MANET
by: Yasir Abdelgadir , Mohamed, et al.
by: Yasir Abdelgadir , Mohamed, et al.
Achieving security for images by LSB and MD5
by: Alahmad, Mohammad, et al.
Published: (2012)
by: Alahmad, Mohammad, et al.
Published: (2012)
A review on massive MIMO antennas for 5G communication systems on challenges and limitations
by: Mandeep Singh, Jit Singh, et al.
Published: (2023)
by: Mandeep Singh, Jit Singh, et al.
Published: (2023)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Portable anti-theft device
by: Johari Halim Shah, Nadira, et al.
Published: (2020)
by: Johari Halim Shah, Nadira, et al.
Published: (2020)
A survey of VASNET framework to provide infrastructure-less green iots communications for data dissemination in search and rescue operations
by: Jambli, Mohamad Nazim, et al.
Published: (2016)
by: Jambli, Mohamad Nazim, et al.
Published: (2016)
A Review on Predictive Model for Heart Disease using Wearable Devices Datasets
by: Mohd Syafiq Asyraf, Suhaimi, et al.
Published: (2024)
by: Mohd Syafiq Asyraf, Suhaimi, et al.
Published: (2024)
Biologically Inspired Model for Securing Mobile Ad Hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Securing Mobile Ad hoc Domain by Immune-Inspired Mechanism
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Similar Items
-
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017) -
Wireless network security: 3G, 4G, wireless PAN/LAN/MAN
by: Pathan, Al-Sakib Khan
Published: (2012) -
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016) -
Wireless Networks and Security: Issues, Challenges and Research Trends
by: Khan, Shafiullah, et al.
Published: (2012) -
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)