Akhil Gupta*, Rakesh Kumar Jha and Reeta Devi Pages 92 - 99 ( 8 )
Background & Objective: Present wireless generation i.e. 4G is facing challenges like interference management, load sharing and increased capacity demands. Researchers all over the globe are working on to overcome these challenges by introducing 5G in the market. The introduction of relays in Device to Device (D2D) communication and small cell access point (SCA) has fulfilled the issues of interference management, load sharing and increased capacity. But in the journey of introducing these new technologies, somewhere the aspect of security has been ignored.
Methodology: This paper focuses on the security architecture of 5G wireless communication networks (WCN). There will be three possible cases in which the security of 5G WCN can be breached. First case will be the security breach through cloud, which is considered as the integral component in Internet of things. The second and the third case will be the security breach through relays and SCA.
Conclusion: This paper focusses on the security cases involving relays and SCA, as these components will be the integral part of 5G in the recent future. This paper has also proposed a triple layer security approach that will be helpful in combating the security threats.
5G, intrusion detection system, relay, small cell, wireless communication network, High Speed Packet Access (HSPA).
School of Electronics and Electrical Engineering, Lovely Professional University, Phagwara, Department of Electronics and Communication Engineering, Shri Mata Vaishno Devi University, Katra, Department of Electronics and Communication Engineering, Shri Mata Vaishno Devi University, Katra