Research Article
Towards Security Mechanism in D2D Wireless Communication: A 5G Network Approach
| Notations | Definition |
| DM | Data management | UE | User equipment | BS | Base station | D2D | Device to device | ECC | Elliptic curve cryptography | Non | A random value | Dsig | Digital signature | PUk | Public key | PRk | Private key | keysec | Secret key |
|
|