Security-Aware and Privacy-Preserving D2D Communications in 5G

Device-to-device communication is a promising technology that can offload heavy traffic in 5G networks. However, due to its open nature, there are several security issues. The LTE-A standard introduces security and protection mechanisms, which include mutual authentication between the UEs and the eN...

Full description

Saved in:
Bibliographic Details
Published inIEEE network Vol. 31; no. 4; pp. 70 - 77
Main Authors Zhang, Aiqing, Lin, Xiaodong
Format Journal Article
LanguageEnglish
Published New York IEEE 01.07.2017
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Device-to-device communication is a promising technology that can offload heavy traffic in 5G networks. However, due to its open nature, there are several security issues. The LTE-A standard introduces security and protection mechanisms, which include mutual authentication between the UEs and the eNB. Unfortunately, D2D communications still face various threats: jamming, data modification, free-riding, and privacy violation. In this article, we first give an architecture for an LTE-D2D system and its application scenarios with various security threats and requirements. Then we investigate privacy concerns in terms of location privacy, identity privacy, and data privacy. Afterward, we propose security solutions from aspects of application-layer security and physical-layer security, respectively. Further, we propose two frameworks for cross-application-physical-layer security methods. Finally, the challenges and future research directions are presented.
AbstractList Device-to-device communication is a promising technology that can offload heavy traffic in 5G networks. However, due to its open nature, there are several security issues. The LTE-A standard introduces security and protection mechanisms, which include mutual authentication between the UEs and the eNB. Unfortunately, D2D communications still face various threats: jamming, data modification, free-riding, and privacy violation. In this article, we first give an architecture for an LTE-D2D system and its application scenarios with various security threats and requirements. Then we investigate privacy concerns in terms of location privacy, identity privacy, and data privacy. Afterward, we propose security solutions from aspects of application-layer security and physical-layer security, respectively. Further, we propose two frameworks for cross-application-physical-layer security methods. Finally, the challenges and future research directions are presented.
Author Aiqing Zhang
Xiaodong Lin
Author_xml – sequence: 1
  givenname: Aiqing
  surname: Zhang
  fullname: Zhang, Aiqing
– sequence: 2
  givenname: Xiaodong
  surname: Lin
  fullname: Lin, Xiaodong
BookMark eNp9kMFKAzEQhoNUsFYfQLwseN6a7CS7m4tQ2lqFqgUreAvZ7FRS2mxNdit9e7e2ePDgaWDm_2aG75x0XOWQkCtG-4xRefv0PJ73E8qyPkspTSQ9IV0mRB4zkb53SJfmksY55fyMnIewpJRxAUmX3L2iabytd_HgS3uMtCujmbdbbXbxzGNAv7XuIxolo2hYrdeNs0bXtnIhsi4SkwtyutCrgJfH2iNv9-P58CGevkweh4NpbEDIOja8QK0NlpDjAnIGKZQAHEwi0gzToizzlLdzpCXSpJCFMVAWuOAiy9o2QI_cHPZufPXZYKjVsmq8a08qJhMBXELG21R2SBlfheBxoYytf96tvbYrxajay1J7WWovSx1ltST7Q268XWu_-5e5PjAWEX_zmZRcshy-Ab1wdy8
CODEN IENEET
CitedBy_id crossref_primary_10_1016_j_jnca_2020_102817
crossref_primary_10_1016_j_future_2018_12_032
crossref_primary_10_3390_bs14030158
crossref_primary_10_3390_sym11080969
crossref_primary_10_1109_COMST_2018_2865607
crossref_primary_10_1109_OJVT_2020_2999885
crossref_primary_10_3390_fi16030067
crossref_primary_10_1109_ACCESS_2022_3159686
crossref_primary_10_1109_ACCESS_2020_2984204
crossref_primary_10_1109_JIOT_2022_3175952
crossref_primary_10_1007_s10922_022_09695_z
crossref_primary_10_3390_electronics10131608
crossref_primary_10_1109_TVT_2019_2893931
crossref_primary_10_1109_MNET_001_1900662
crossref_primary_10_1016_j_comnet_2019_106871
crossref_primary_10_1109_ACCESS_2018_2834934
crossref_primary_10_1109_ACCESS_2019_2914359
crossref_primary_10_1109_COMST_2022_3224279
crossref_primary_10_1109_ACCESS_2020_3028764
crossref_primary_10_1145_3696446
crossref_primary_10_1016_j_phycom_2020_101109
crossref_primary_10_1109_JSAC_2021_3118344
crossref_primary_10_1007_s12083_020_00962_x
crossref_primary_10_1109_COMST_2018_2878035
crossref_primary_10_1080_09540091_2021_2002812
crossref_primary_10_1177_1550147717738225
crossref_primary_10_1007_s11277_022_10069_6
crossref_primary_10_3390_computers9010008
crossref_primary_10_1109_JSTSP_2024_3374591
crossref_primary_10_1109_TDSC_2020_2989784
crossref_primary_10_1016_j_comnet_2023_109679
crossref_primary_10_17706_ijeeee_2019_9_2_108_115
crossref_primary_10_1109_TWC_2018_2877610
crossref_primary_10_1109_JSAC_2018_2825484
crossref_primary_10_1016_j_telpol_2024_102793
crossref_primary_10_1109_OJCOMS_2021_3103445
crossref_primary_10_1016_j_csi_2021_103540
crossref_primary_10_1007_s11432_019_2834_x
crossref_primary_10_1109_LCOMM_2020_3018165
crossref_primary_10_3390_sym14061160
crossref_primary_10_1109_JPROC_2019_2948302
crossref_primary_10_1109_ACCESS_2020_2970464
crossref_primary_10_1109_OJCOMS_2024_3392359
crossref_primary_10_1016_j_comnet_2020_107192
Cites_doi 10.1007/978-3-540-40061-5_29
10.1109/MWC.2010.5675775
10.1109/TMC.2012.63
10.1049/iet-com.2012.0300
10.1126/science.aaa1465
10.1007/978-3-319-32458-6
10.1109/TMC.2007.1062
10.1109/LCOMM.2013.092813.131367
10.1109/ICASSP.2014.6853869
10.1109/TIT.1978.1055917
10.1109/TVT.2015.2416002
10.1109/MNET.2015.7166190
10.1109/ICC.2014.6883669
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/MNET.2017.1600290
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-156X
EndPage 77
ExternalDocumentID 10_1109_MNET_2017_1600290
7994918
Genre orig-research
GroupedDBID -~X
.DC
0R~
29I
4.4
5GY
5VS
6IK
97E
AAIKC
AAJGR
AAMNW
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACIWK
AENEX
AETIX
AFOGA
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
AZLTO
BEFXN
BFFAM
BGNUA
BKEBE
BKOMP
BPEOZ
CS3
DU5
EBS
EJD
F5P
HZ~
H~9
ICLAB
IES
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
PQQKQ
RIA
RIE
RNS
TN5
VH1
ZCA
AAYOK
AAYXX
CITATION
RIG
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c359t-c4beaaced38ef381363d3343c2567e6bdd864acee0de02b9bcc3dbef4577ace33
IEDL.DBID RIE
ISSN 0890-8044
IngestDate Mon Jun 30 06:18:38 EDT 2025
Thu Apr 24 22:59:41 EDT 2025
Tue Jul 01 01:52:32 EDT 2025
Wed Aug 27 03:08:04 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c359t-c4beaaced38ef381363d3343c2567e6bdd864acee0de02b9bcc3dbef4577ace33
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 1925349374
PQPubID 36211
PageCount 8
ParticipantIDs proquest_journals_1925349374
ieee_primary_7994918
crossref_citationtrail_10_1109_MNET_2017_1600290
crossref_primary_10_1109_MNET_2017_1600290
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2017-07-01
PublicationDateYYYYMMDD 2017-07-01
PublicationDate_xml – month: 07
  year: 2017
  text: 2017-07-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE network
PublicationTitleAbbrev NET-M
PublicationYear 2017
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
al-riyami (ref11) 0; 2894
ref15
ref14
ref10
ref1
(ref2) 2013
due (ref3) 2013; 17
ref7
ref9
ref4
ref5
acquits (ref8) 2015; 347
hassan awan (ref6) 0
References_xml – volume: 2894
  start-page: 452
  year: 0
  ident: ref11
  article-title: Certificateless Public Key Cryptography
  publication-title: Proc ASIACRYPT 2003
  doi: 10.1007/978-3-540-40061-5_29
– ident: ref7
  doi: 10.1109/MWC.2010.5675775
– ident: ref14
  doi: 10.1109/TMC.2012.63
– ident: ref15
  doi: 10.1049/iet-com.2012.0300
– year: 0
  ident: ref6
  article-title: Fundamental Limits of Caching in D2D Networks With Secure Delivery
  publication-title: IEEE ICC
– volume: 347
  start-page: 509
  year: 2015
  ident: ref8
  article-title: Privacy and Human Behavior in the Age of Information
  publication-title: Science
  doi: 10.1126/science.aaa1465
– year: 2013
  ident: ref2
  article-title: Feasible Study for Proximity Services (ProSe)
  publication-title: TR 22 803 v 12 2 0 Rel-12
– ident: ref13
  doi: 10.1007/978-3-319-32458-6
– ident: ref9
  doi: 10.1109/TMC.2007.1062
– volume: 17
  start-page: 2068
  year: 2013
  ident: ref3
  article-title: Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks
  publication-title: IEEE Commun Lett
  doi: 10.1109/LCOMM.2013.092813.131367
– ident: ref5
  doi: 10.1109/ICASSP.2014.6853869
– ident: ref10
  doi: 10.1109/TIT.1978.1055917
– ident: ref12
  doi: 10.1109/TVT.2015.2416002
– ident: ref1
  doi: 10.1109/MNET.2015.7166190
– ident: ref4
  doi: 10.1109/ICC.2014.6883669
SSID ssj0014532
Score 2.409827
Snippet Device-to-device communication is a promising technology that can offload heavy traffic in 5G networks. However, due to its open nature, there are several...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 70
SubjectTerms 5G mobile communication
Authentication
Cellular networks
Communications traffic
Cybersecurity
Device-to-device communication
Heterogeneous networks
Jamming
Microcell networks
Network security
Privacy
Safety
Servers
Traffic flow
Title Security-Aware and Privacy-Preserving D2D Communications in 5G
URI https://ieeexplore.ieee.org/document/7994918
https://www.proquest.com/docview/1925349374
Volume 31
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH-4nfTg1xSnU3rwJGZmS9o0F2HopggbggreSpO8ylA62TpF_3qTtit-Id5Km5TwXvLyS97HD-DQwYSEG5_wEAWxKzEhSpqExC5qPAwTnyuXOzwcBZd3_Orev1-C4yoXBhHz4DNsu8fcl28meu6uyk6ElFx2whrU7MGtyNWqPAbcz8nIaOhSoynnpQezQ-XJcNS_dUFc-VUK7Trz-2kPyklVfljifHsZrMFwMbAiquSxPc9UW79_q9n435Gvw2qJM71eMTE2YAnTTVj5VH2wAac3JXcd6b3GU_Ti1HjX0_FLrN-Ii8xwViR98M67596XNJKZN049_2IL7gb927NLUtIpEM18mRHNFcaxRsNCTOxGzQJmGONMW9QjMFDGhAG335EapF0lldbMKEy4L4R9zdg21NNJijvgdTAwJpECMWacxjQUie44-rJAKyGYaAJdCDjSZa1xR3nxFOVnDiojp5PI6SQqddKEo6rLc1Fo46_GDSfjqmEp3ia0FlqMyqU4iyyE9Rm3KIzv_t5rD5bdv4sY3BbUs-kc9y3SyNRBPsU-AOOgzvM
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV3NTtwwEB4heqA9lFJasUCLD-2lkhdvbMfxgUqoCyyFXVXqInFLY3uCEFVA-1MEz9JX6bvVTrwraFFvSL1Fia0oni8z4_E3MwDvgptQCiepyFBR_yeW1GhX0iKwxrOslMKE3OH-IO2diM-n8nQBfs5zYRCxJp9hO1zWZ_nu0k5DqGxbaS10J4sUyiO8ufYbtPHOYddL832S7O8NP_Vo7CFALZd6Qq0wWBQWHc-w9NaJp9xxLrj1pl5hapzLUuGfI3PIEqONtdwZLIVUyt8O4U6v4J94P0MmTXbY_IxCyLr9GctCMjYTIp6Zdpje7g_2hoE2VgdvWBIU_h2rV7dx-Uv31wZtfxl-zZai4bFctKcT07a3f1SJ_F_X6gU8j5402W2gvwILWL2EZ3fqK67Cx6-xOx_dvS5GSIrKkS-j8x-FvaGBexL0ZHVGukmX3EuUGZPzisiDV3DyKB_wGharywrXgHQwda7UCrHgghUsU6XthAZtqTVKcdUCNhNobmM19dDU43te76qYzgMG8oCBPGKgBR_mU66aUiL_GrwaZDofGMXZgs0ZavKobMa5d9IlF97PFOsPz9qCpd6wf5wfHw6ONuBpeE_DON6Excloim-8XzUxb2t4E_j22Bj5DRt5MTE
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security-Aware+and+Privacy-Preserving+D2D+Communications+in+5G&rft.jtitle=IEEE+network&rft.au=Aiqing+Zhang&rft.au=Xiaodong+Lin&rft.date=2017-07-01&rft.pub=IEEE&rft.issn=0890-8044&rft.volume=31&rft.issue=4&rft.spage=70&rft.epage=77&rft_id=info:doi/10.1109%2FMNET.2017.1600290&rft.externalDocID=7994918
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0890-8044&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0890-8044&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0890-8044&client=summon