SeDS: Secure Data Sharing Strategy for D2D Communication in LTE-Advanced Networks
Security and availability are two crucial issues in device-to-device (D2D) communication, with its fast development in fourth-generation (4G) Long-Term Evolution Advanced (LTE-Advanced) networks. In this paper, we propose a secure data sharing protocol, which merges the advantages of public key cryp...
Saved in:
Published in | IEEE transactions on vehicular technology Vol. 65; no. 4; pp. 2659 - 2672 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.04.2016
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Security and availability are two crucial issues in device-to-device (D2D) communication, with its fast development in fourth-generation (4G) Long-Term Evolution Advanced (LTE-Advanced) networks. In this paper, we propose a secure data sharing protocol, which merges the advantages of public key cryptography and symmetric encryption, to achieve data security in D2D communication. Specifically, a public-key-based digital signature, combined with a mutual authentication mechanism of a cellular network, guarantees entity authentication, transmission nonrepudiation, traceability, data authority, and integrity. Meanwhile, symmetric encryption is employed to ensure data confidentiality. A salient feature of the proposed protocol is that it can detect free-riding attack by keeping a record of the current status for user equipment (UE) and realize reception nonrepudiation by key hint transmission between the UE and evolved NodeB, thus improving system availability. Furthermore, various delay models are established in different application scenarios to seek the optimal initial service providers (SPs) for achieving tradeoff between cost and availability. Extensive analysis and simulations demonstrate that the proposed protocol is indeed an efficient and practical solution for a secure data sharing mechanism for D2D communication. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
ISSN: | 0018-9545 1939-9359 |
DOI: | 10.1109/TVT.2015.2416002 |