Minimal Impact on the Performance of Device-To-Device Communication in 5G

Abstract

Traditional cellular network, devices are not permitted to directly communicate with each other in the approved cellular bandwidth and all communications take place via the base stations. In this article, we foresee a two-tier cellular network that includes a macrocell tier (i.e., BS-to-system communications) and a system tier (i.e., node-to-device communications A).System terminal relaying makes it possible for devices in a network to act as transmission relays for each other and realize a huge ad hoc mesh network. It is clearly a radical break from the traditional cellular architecture and presents particular technological challenges. In such a two-tier cellular system, since the user data is routed through other users’ devices, security must be maintained for privacy. To ensure minimal impact on the performance of existing macrocell BSs, the two-tier network needs to be designed with smart interference management strategies and appropriate resource allocation schemes. Furthermore, novel pricing models should be designed to tempt devices to participate in this type of communication. Our article provides an overview of these major challenges in two-tier networks and proposes some pricing schemes for different types of device relaying. 

Country : India

1 Kishore Thangedi

  1. Assistant Professor, Department of Electronics and Communication Engineering, Malla Reddy College of Engineering for Women, Hyderabad -500100, Telangana, India

IRJIET, Volume 4, Issue 3, March 2020 pp. 61-65

.

References

  1. C.Hoymannetal.,“RelayingOperationin3GPPLTE: Challenges and Solutions,” IEEE Commun. Mag., vol. 50, no. 2, Feb. 2012, pp.156–62.
  2. D. Feng et al., “Device-to-Device Communications Underlaying Cellular Networks,” IEEE Trans. Commun., vol. 61, no. 8, 2013, pp.3541–51.
  3. Cha et al., “Trust in M2M Communication,” IEEE Vehic.Tech.Mag.,vol.4,no.3,Sept.2009,pp.69–75.
  4. J.Yueetal., “Secrecy- Based Access Controlfor Device- to-Device Communication Under laying CellularNet- works,” IEEE Commun. Letters, vol. 17, no. 11, 2013, pp.2068–71.
  5. Perrig,J.Stankovic,andD.Wagner,“Securityin Wireless Sensor Networks,” Commun. ACM, vol. 47, no. 6, June 2004, pp.53–57.
  6. Y.Zhou,Y.Fang,andY.Zhang,“Securing Wireless Sensor Networks: A Survey,” IEEE Commun. Surveys Tutorials,vol.10,no.3,2008,pp.6–28.
  7. R.MuraleedharanandL.A.Osadciw,“JammingAttack Detection and Countermeasures in Wireless Sensor Net- work Using Ant System,” Defense and Security Symp., May 2006, p.62480G.
  8. E. Hossain, D. Niyato, and Z. Han, Dynami Spectrum Access and Management in Cognitive Radio Networks, 1st ed., Cambridge Univ. Press,2009.
  9. N.Fernando,S.W.Loke,andW.Rahayu,“Mobile Cloud Computing: A Survey,” Future Generation Com- puter Systems, vol. 29, no. 1, Jan. 2013, pp.84–106.