Abstract

Due to the availability of handheld, mobile devices and the advent of cloud and bog data applications, the data traffic in the licensed bands has increased. This has led to the exploration of alternative avenues to de-load the conventional wireless networks. A new paradigm called device to device networks has evolved which is a category of mobile ad-hoc networks. Device-to- device (D2D) communication is expected to play a significant role in upcoming networks as it will reduce the burden from the cellular systems. This may make big data applications easier. However the D2D networks don’t use the security provided by cellular networks. Hence there is a chance of attacks. The major attack in D2D devices is the eavesdropping attack in which mobile hosts share the same wireless medium and broadcast signals over airwaves, which can be easily intercepted by receivers tuned to the proper frequency. Thus, the attacker can read exchanged messages and is able to inject fake messages to manipulate other users. This paper investigates the salient approaches of D2D networks in the context of security and access control and existing research methods. Keywords: Internet of Things (IoT), Network Security, D2D Security, Throughput, Error Rate.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call