Research Article

Towards Security Mechanism in D2D Wireless Communication: A 5G Network Approach

Figure 3

Link setup and data transfer process.