proposed that the Device-to-Device (D2D) reduce frequency overload of the BS and all of the user equipment (UE) inside the BS and neighbor BS don't allow communicating directly to BS. However, in LTE-Advance system cellular link and sharing radio resources of D2D link, the strong interference of the cellular network is still high. So we need to eliminate or mitigate the interference. In this paper, we use the transmission power control method and Soft Frequency Reuse (SFR) resource allocation method to mitigate the interference of the cellular link and D2D link.Simulation results show that the proposed scheme has high performance in terms of Signal to Noise Ratio (SINR) and system average throughput.
Home network service has been integrated with various communication technologies to help people have a more convenient life. It is expected that wireless LAN (WLAN), B l u e t o o t h , u l t r a w i d e b a n d (U W B) , a n d Z i g b e e w i l l b e u s e d i n h o m e n e t w o r k s a s wireless access technologies to provide various home network services. WLAN study among them is actively making progress. But WLAN communication technologies have a problem in that access points (APs) cannot control the transmission range. This property allows the neighbor or person in the next house to receive the traffic and a malicious intruder to subvert the privacy. Therefore, authentication mechanisms have to be considered so that only an eligible user is authenticated to use the resources of a home network. IEEE 802.11 working group (WG) specifies an authentication procedure but it provide the only basic mechanism which can't protect the WLAN communications from the ineligible approach. The IEEE 802.11i standardization group is working on an access control based on IEEE 802.1x and air traffic encryption to strengthen WLAN security techniques. In a conventional method, the nonprofessional user finds it very difficult to setup security information inside WLAN stations and APs. However, there are the various user levels of computer knowledge in a home network. Because of this reason the way to setup authentication information should be prepared so it is easy for users who are not computer professionals. In this research, we propose access control mechanism considering the convenience of users, secure authentication protocol, and the intrusion detection system to support access control mechanism. Section II presents related literatures. In Section III, we propose authentication mechanism and the intrusion detection system for home network. The performance analysis of the proposed security mechanisms is presented in Section IV. Finally Section V concludes the research.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.