Research Article

Network Coding-Based D2D Transmission for Public Safety Networks over LTE HetNets and 5G Networks

Figure 8

Confidentiality attack: internal and external attacks in the WMN.