Research Article

Towards Security Mechanism in D2D Wireless Communication: A 5G Network Approach

Figure 6

Protocol overhead vs D2D requests.