Home > Computer Science > Computer Network > Volume-2 > Issue-3 > Promoting Device-to-Device Communication in Cellular Networks by Hashing Techniques

Promoting Device-to-Device Communication in Cellular Networks by Hashing Techniques

Call for Papers

Volume-3 | Issue-2

Last date : 25-Feb-2019

Best International Journal
Open Access | Peer Reviewed | Best International Journal | Indexing & IF | 24*7 Support | Dedicated Qualified Team | Rapid Publication Process | International Editor, Reviewer Board | Attractive User Interface with Easy Navigation

Journal Type : Open Access

Processing Charges : 700/- INR Only OR 25 USD (for foreign users)

Paper Publish : Within 2-4 Days after submitting

Submit Paper Online

For Author

IJTSRD Publication

Research Area

News & Events


Promoting Device-to-Device Communication in Cellular Networks by Hashing Techniques

K Sandeep | K. Monisha | G. Navya | D. Harika | T. Aasritha

K Sandeep | K. Monisha | G. Navya | D. Harika | T. Aasritha "Promoting Device-to-Device Communication in Cellular Networks by Hashing Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11229.pdf

In the current generation network traffic has become a major problem.D2D communication has been proposed as a promising technique to improve resource utilization of cellular networks by offloading the traffic through base station.D2D communication in cellular networks is direct communication between two devices without traversing the base station or core network.In this article we fill the gap by designing incentive mechanisms to encourage users to work under D2D mode. To recognize the proximity based devices, every one of the devices should initially discover close proximity devices by using device discovery mechanism. This mechanism discovers the nearby devices by broadcasting the discovery signals. The main aim of the project is to achieve direct transmission of data between devices in a secured manner. For secure wireless transmission we use hashing techniques which protects the data from being exposed.

D2D communication, Cellular networks, Resource utilization, device discovery, hashing


Volume-2 | Issue-3 , April 2018

2456-6470

IJTSRD11229