Skip to content
2000
Volume 8, Issue 2
  • ISSN: 2210-3279
  • E-ISSN: 2210-3287

Abstract

Background & Objective: Present wireless generation i.e. 4G is facing challenges like interference management, load sharing and increased capacity demands. Researchers all over the globe are working on to overcome these challenges by introducing 5G in the market. The introduction of relays in Device to Device (D2D) communication and small cell access point (SCA) has fulfilled the issues of interference management, load sharing and increased capacity. But in the journey of introducing these new technologies, somewhere the aspect of security has been ignored. Methodology: This paper focuses on the security architecture of 5G wireless communication networks (WCN). There will be three possible cases in which the security of 5G WCN can be breached. First case will be the security breach through cloud, which is considered as the integral component in Internet of things. The second and the third case will be the security breach through relays and SCA. Conclusion: This paper focusses on the security cases involving relays and SCA, as these components will be the integral part of 5G in the recent future. This paper has also proposed a triple layer security approach that will be helpful in combating the security threats.

Loading

Article metrics loading...

/content/journals/swcc/10.2174/2210327908666180514105607
2018-08-01
2025-09-08
Loading full text...

Full text loading...

/content/journals/swcc/10.2174/2210327908666180514105607
Loading
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test