Research Article

Towards Security Mechanism in D2D Wireless Communication: A 5G Network Approach

Table 2

Abbreviation list.

NotationsDefinition

DMData management
UEUser equipment
BSBase station
D2DDevice to device
ECCElliptic curve cryptography
NonA random value
DsigDigital signature
PUkPublic key
PRkPrivate key
keysecSecret key