2022
DOI: 10.32604/csse.2022.023609
|View full text |Cite
|
Sign up to set email alerts
|

Gray-Hole Attack Minimization in IoMT with 5G Based D2D Networks

Abstract: Reliable transmission is vital to the success of the next generation of communications technologies and Fifth Generation (5G) networks. Many sensitive applications, such as eHealth and medical services, can benefit from a 5G network. The Internet of Medical Things (IoMT) is a new field that fosters the maintenance of trust among various IoMT Device to Device (D2D) modern technologies. In IoMT the medical devices have to be connected through a wireless network and constantly needs to be self-configured to provi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…As a result, D2D communication technology has been developed, and it now presents an important part in the modern 5G cellular network [1,2]. One of the basic 5G technologies is D2D communication network, which is described as a collection of devices that can communicate with each other wirelessly without the need for an infrastructure or a central authority [3]. The rapid increase in CUs, combined with the high demand for improving quality of service (QoS), has resulted in a decrease in spectral resources, which is one of several main factors restricting the development of modern communication networks [4,5] with the foreseeable explosion in the number of wireless devices, and the continuing development of multimedia services [6].…”
Section: Introductionmentioning
confidence: 99%
“…As a result, D2D communication technology has been developed, and it now presents an important part in the modern 5G cellular network [1,2]. One of the basic 5G technologies is D2D communication network, which is described as a collection of devices that can communicate with each other wirelessly without the need for an infrastructure or a central authority [3]. The rapid increase in CUs, combined with the high demand for improving quality of service (QoS), has resulted in a decrease in spectral resources, which is one of several main factors restricting the development of modern communication networks [4,5] with the foreseeable explosion in the number of wireless devices, and the continuing development of multimedia services [6].…”
Section: Introductionmentioning
confidence: 99%
“…However, there exist potential security threats in clusterbased D2D communications when a malicious user is a member of the cluster. Several types of D2D attacks have been reported recently such as eavesdropping, free-riding, CSI forgery, denial-of-service, key compromise impersonation, and gray-hole attacks [12], [13], [14], [15].…”
Section: Introductionmentioning
confidence: 99%