2018
DOI: 10.1007/s13369-018-3255-6
|View full text |Cite
|
Sign up to set email alerts
|

Handover Authentication Scheme for Device-to-Device Outband Communication in 5G-WLAN Next Generation Heterogeneous Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(24 citation statements)
references
References 20 publications
0
24
0
Order By: Relevance
“…Kumar et al [21] and He et al [22] have proposed energy cost evaluation, which considers that the maximum CPU power of devices (W) is approximately 10.88 Watts. The energy overhead was calculated as follows: ETotal = CCTotal × W, where CCTotal is the computational cost calculated and presented in Section 5.1.…”
Section: Energy Costmentioning
confidence: 99%
“…Kumar et al [21] and He et al [22] have proposed energy cost evaluation, which considers that the maximum CPU power of devices (W) is approximately 10.88 Watts. The energy overhead was calculated as follows: ETotal = CCTotal × W, where CCTotal is the computational cost calculated and presented in Section 5.1.…”
Section: Energy Costmentioning
confidence: 99%
“…Kumar et al presented a safe handover authentication scheme to be well suited for D2D communication in heterogeneous networks. This authentication scheme provides higher security in D2D communication when compared with other techniques.…”
Section: Related Workmentioning
confidence: 99%
“…the interference among the D2D users and the k CUs will be increased. Therefore, the coverage probability of D2D users P cov d β d is decreased resulting in decreasing the ASR according to (6) and (5). So, the huge number of D2D pairs cannot recompense the lack of D2D rate.…”
Section: Outage Probability Performancementioning
confidence: 99%
“…D2D communication can be characterised into two categories: in‐band D2D (where the D2D communication is in the licensed spectrum) and out band D2D (where the D2D communication is in the unlicensed spectrum). The in‐band D2D communication is divided into the underlay D2D [4] and the overlay D2D [5], whereas, the out‐band D2D communication is broken up into controlled [6] and autonomous [7].…”
Section: Introductionmentioning
confidence: 99%