The visualization of future generation Wireless Communication Network WCN
redirects the presumption of onward innovations, the fulfillment of user
demands in the form of high data rates, energy efficiency, low latency, and
long-range services. To content these demands, various technologies such as
massive MIMO Multiple Input Multiple Output, UDN Ultra Dense Network, spectrum
sharing, D2D Device to Device communication were improvised in the next
generation WCN. In comparison to previous technologies, these technologies
exhibit flat architecture, the involvement of clouds in the network,
centralized architecture incorporating small cells which creates vulnerable
breaches initiating menaces to the security of the network. The half-duplex
attack is another threat to the WCN, where the resource spoofing mechanism is
attained in the downlink phase of D2D communication. Instead of triggering an
attack on both uplink and downlink, solely downlink is targeted by the
attacker. This scheme allows the reduced failed attempt rate of the attacker as
compared to the conventional attacks. The analysis is determined on the basis
of Poissons distribution to determine the probability of failed attempts of
half duplex attack in contrast to a full duplex attack

Go to Source of this post
Author Of this post: <a href="http://arxiv.org/find/cs/1/au:+Shafi_M/0/1/0/all/0/1">Misbah Shafi</a>, <a href="http://arxiv.org/find/cs/1/au:+Jha_R/0/1/0/all/0/1">Rakesh Kumar Jha</a>

By admin