Security-Aware and Privacy-Preserving D2D Communications in 5G
Device-to-device communication is a promising technology that can offload heavy traffic in 5G networks. However, due to its open nature, there are several security issues. The LTE-A standard introduces security and protection mechanisms, which include mutual authentication between the UEs and the eN...
Saved in:
Published in | IEEE network Vol. 31; no. 4; pp. 70 - 77 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.07.2017
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Device-to-device communication is a promising technology that can offload heavy traffic in 5G networks. However, due to its open nature, there are several security issues. The LTE-A standard introduces security and protection mechanisms, which include mutual authentication between the UEs and the eNB. Unfortunately, D2D communications still face various threats: jamming, data modification, free-riding, and privacy violation. In this article, we first give an architecture for an LTE-D2D system and its application scenarios with various security threats and requirements. Then we investigate privacy concerns in terms of location privacy, identity privacy, and data privacy. Afterward, we propose security solutions from aspects of application-layer security and physical-layer security, respectively. Further, we propose two frameworks for cross-application-physical-layer security methods. Finally, the challenges and future research directions are presented. |
---|---|
AbstractList | Device-to-device communication is a promising technology that can offload heavy traffic in 5G networks. However, due to its open nature, there are several security issues. The LTE-A standard introduces security and protection mechanisms, which include mutual authentication between the UEs and the eNB. Unfortunately, D2D communications still face various threats: jamming, data modification, free-riding, and privacy violation. In this article, we first give an architecture for an LTE-D2D system and its application scenarios with various security threats and requirements. Then we investigate privacy concerns in terms of location privacy, identity privacy, and data privacy. Afterward, we propose security solutions from aspects of application-layer security and physical-layer security, respectively. Further, we propose two frameworks for cross-application-physical-layer security methods. Finally, the challenges and future research directions are presented. |
Author | Aiqing Zhang Xiaodong Lin |
Author_xml | – sequence: 1 givenname: Aiqing surname: Zhang fullname: Zhang, Aiqing – sequence: 2 givenname: Xiaodong surname: Lin fullname: Lin, Xiaodong |
BookMark | eNp9kMFKAzEQhoNUsFYfQLwseN6a7CS7m4tQ2lqFqgUreAvZ7FRS2mxNdit9e7e2ePDgaWDm_2aG75x0XOWQkCtG-4xRefv0PJ73E8qyPkspTSQ9IV0mRB4zkb53SJfmksY55fyMnIewpJRxAUmX3L2iabytd_HgS3uMtCujmbdbbXbxzGNAv7XuIxolo2hYrdeNs0bXtnIhsi4SkwtyutCrgJfH2iNv9-P58CGevkweh4NpbEDIOja8QK0NlpDjAnIGKZQAHEwi0gzToizzlLdzpCXSpJCFMVAWuOAiy9o2QI_cHPZufPXZYKjVsmq8a08qJhMBXELG21R2SBlfheBxoYytf96tvbYrxajay1J7WWovSx1ltST7Q268XWu_-5e5PjAWEX_zmZRcshy-Ab1wdy8 |
CODEN | IENEET |
CitedBy_id | crossref_primary_10_1016_j_jnca_2020_102817 crossref_primary_10_1016_j_future_2018_12_032 crossref_primary_10_3390_bs14030158 crossref_primary_10_3390_sym11080969 crossref_primary_10_1109_COMST_2018_2865607 crossref_primary_10_1109_OJVT_2020_2999885 crossref_primary_10_3390_fi16030067 crossref_primary_10_1109_ACCESS_2022_3159686 crossref_primary_10_1109_ACCESS_2020_2984204 crossref_primary_10_1109_JIOT_2022_3175952 crossref_primary_10_1007_s10922_022_09695_z crossref_primary_10_3390_electronics10131608 crossref_primary_10_1109_TVT_2019_2893931 crossref_primary_10_1109_MNET_001_1900662 crossref_primary_10_1016_j_comnet_2019_106871 crossref_primary_10_1109_ACCESS_2018_2834934 crossref_primary_10_1109_ACCESS_2019_2914359 crossref_primary_10_1109_COMST_2022_3224279 crossref_primary_10_1109_ACCESS_2020_3028764 crossref_primary_10_1145_3696446 crossref_primary_10_1016_j_phycom_2020_101109 crossref_primary_10_1109_JSAC_2021_3118344 crossref_primary_10_1007_s12083_020_00962_x crossref_primary_10_1109_COMST_2018_2878035 crossref_primary_10_1080_09540091_2021_2002812 crossref_primary_10_1177_1550147717738225 crossref_primary_10_1007_s11277_022_10069_6 crossref_primary_10_3390_computers9010008 crossref_primary_10_1109_JSTSP_2024_3374591 crossref_primary_10_1109_TDSC_2020_2989784 crossref_primary_10_1016_j_comnet_2023_109679 crossref_primary_10_17706_ijeeee_2019_9_2_108_115 crossref_primary_10_1109_TWC_2018_2877610 crossref_primary_10_1109_JSAC_2018_2825484 crossref_primary_10_1016_j_telpol_2024_102793 crossref_primary_10_1109_OJCOMS_2021_3103445 crossref_primary_10_1016_j_csi_2021_103540 crossref_primary_10_1007_s11432_019_2834_x crossref_primary_10_1109_LCOMM_2020_3018165 crossref_primary_10_3390_sym14061160 crossref_primary_10_1109_JPROC_2019_2948302 crossref_primary_10_1109_ACCESS_2020_2970464 crossref_primary_10_1109_OJCOMS_2024_3392359 crossref_primary_10_1016_j_comnet_2020_107192 |
Cites_doi | 10.1007/978-3-540-40061-5_29 10.1109/MWC.2010.5675775 10.1109/TMC.2012.63 10.1049/iet-com.2012.0300 10.1126/science.aaa1465 10.1007/978-3-319-32458-6 10.1109/TMC.2007.1062 10.1109/LCOMM.2013.092813.131367 10.1109/ICASSP.2014.6853869 10.1109/TIT.1978.1055917 10.1109/TVT.2015.2416002 10.1109/MNET.2015.7166190 10.1109/ICC.2014.6883669 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/MNET.2017.1600290 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1558-156X |
EndPage | 77 |
ExternalDocumentID | 10_1109_MNET_2017_1600290 7994918 |
Genre | orig-research |
GroupedDBID | -~X .DC 0R~ 29I 4.4 5GY 5VS 6IK 97E AAIKC AAJGR AAMNW AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACIWK AENEX AETIX AFOGA AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV AZLTO BEFXN BFFAM BGNUA BKEBE BKOMP BPEOZ CS3 DU5 EBS EJD F5P HZ~ H~9 ICLAB IES IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL PQQKQ RIA RIE RNS TN5 VH1 ZCA AAYOK AAYXX CITATION RIG 7SC 7SP 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c359t-c4beaaced38ef381363d3343c2567e6bdd864acee0de02b9bcc3dbef4577ace33 |
IEDL.DBID | RIE |
ISSN | 0890-8044 |
IngestDate | Mon Jun 30 06:18:38 EDT 2025 Thu Apr 24 22:59:41 EDT 2025 Tue Jul 01 01:52:32 EDT 2025 Wed Aug 27 03:08:04 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c359t-c4beaaced38ef381363d3343c2567e6bdd864acee0de02b9bcc3dbef4577ace33 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 1925349374 |
PQPubID | 36211 |
PageCount | 8 |
ParticipantIDs | proquest_journals_1925349374 ieee_primary_7994918 crossref_citationtrail_10_1109_MNET_2017_1600290 crossref_primary_10_1109_MNET_2017_1600290 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2017-07-01 |
PublicationDateYYYYMMDD | 2017-07-01 |
PublicationDate_xml | – month: 07 year: 2017 text: 2017-07-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE network |
PublicationTitleAbbrev | NET-M |
PublicationYear | 2017 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 al-riyami (ref11) 0; 2894 ref15 ref14 ref10 ref1 (ref2) 2013 due (ref3) 2013; 17 ref7 ref9 ref4 ref5 acquits (ref8) 2015; 347 hassan awan (ref6) 0 |
References_xml | – volume: 2894 start-page: 452 year: 0 ident: ref11 article-title: Certificateless Public Key Cryptography publication-title: Proc ASIACRYPT 2003 doi: 10.1007/978-3-540-40061-5_29 – ident: ref7 doi: 10.1109/MWC.2010.5675775 – ident: ref14 doi: 10.1109/TMC.2012.63 – ident: ref15 doi: 10.1049/iet-com.2012.0300 – year: 0 ident: ref6 article-title: Fundamental Limits of Caching in D2D Networks With Secure Delivery publication-title: IEEE ICC – volume: 347 start-page: 509 year: 2015 ident: ref8 article-title: Privacy and Human Behavior in the Age of Information publication-title: Science doi: 10.1126/science.aaa1465 – year: 2013 ident: ref2 article-title: Feasible Study for Proximity Services (ProSe) publication-title: TR 22 803 v 12 2 0 Rel-12 – ident: ref13 doi: 10.1007/978-3-319-32458-6 – ident: ref9 doi: 10.1109/TMC.2007.1062 – volume: 17 start-page: 2068 year: 2013 ident: ref3 article-title: Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks publication-title: IEEE Commun Lett doi: 10.1109/LCOMM.2013.092813.131367 – ident: ref5 doi: 10.1109/ICASSP.2014.6853869 – ident: ref10 doi: 10.1109/TIT.1978.1055917 – ident: ref12 doi: 10.1109/TVT.2015.2416002 – ident: ref1 doi: 10.1109/MNET.2015.7166190 – ident: ref4 doi: 10.1109/ICC.2014.6883669 |
SSID | ssj0014532 |
Score | 2.409827 |
Snippet | Device-to-device communication is a promising technology that can offload heavy traffic in 5G networks. However, due to its open nature, there are several... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 70 |
SubjectTerms | 5G mobile communication Authentication Cellular networks Communications traffic Cybersecurity Device-to-device communication Heterogeneous networks Jamming Microcell networks Network security Privacy Safety Servers Traffic flow |
Title | Security-Aware and Privacy-Preserving D2D Communications in 5G |
URI | https://ieeexplore.ieee.org/document/7994918 https://www.proquest.com/docview/1925349374 |
Volume | 31 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH-4nfTg1xSnU3rwJGZmS9o0F2HopggbggreSpO8ylA62TpF_3qTtit-Id5Km5TwXvLyS97HD-DQwYSEG5_wEAWxKzEhSpqExC5qPAwTnyuXOzwcBZd3_Orev1-C4yoXBhHz4DNsu8fcl28meu6uyk6ElFx2whrU7MGtyNWqPAbcz8nIaOhSoynnpQezQ-XJcNS_dUFc-VUK7Trz-2kPyklVfljifHsZrMFwMbAiquSxPc9UW79_q9n435Gvw2qJM71eMTE2YAnTTVj5VH2wAac3JXcd6b3GU_Ti1HjX0_FLrN-Ii8xwViR98M67596XNJKZN049_2IL7gb927NLUtIpEM18mRHNFcaxRsNCTOxGzQJmGONMW9QjMFDGhAG335EapF0lldbMKEy4L4R9zdg21NNJijvgdTAwJpECMWacxjQUie44-rJAKyGYaAJdCDjSZa1xR3nxFOVnDiojp5PI6SQqddKEo6rLc1Fo46_GDSfjqmEp3ia0FlqMyqU4iyyE9Rm3KIzv_t5rD5bdv4sY3BbUs-kc9y3SyNRBPsU-AOOgzvM |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV3NTtwwEB4heqA9lFJasUCLD-2lkhdvbMfxgUqoCyyFXVXqInFLY3uCEFVA-1MEz9JX6bvVTrwraFFvSL1Fia0oni8z4_E3MwDvgptQCiepyFBR_yeW1GhX0iKwxrOslMKE3OH-IO2diM-n8nQBfs5zYRCxJp9hO1zWZ_nu0k5DqGxbaS10J4sUyiO8ufYbtPHOYddL832S7O8NP_Vo7CFALZd6Qq0wWBQWHc-w9NaJp9xxLrj1pl5hapzLUuGfI3PIEqONtdwZLIVUyt8O4U6v4J94P0MmTXbY_IxCyLr9GctCMjYTIp6Zdpje7g_2hoE2VgdvWBIU_h2rV7dx-Uv31wZtfxl-zZai4bFctKcT07a3f1SJ_F_X6gU8j5402W2gvwILWL2EZ3fqK67Cx6-xOx_dvS5GSIrKkS-j8x-FvaGBexL0ZHVGukmX3EuUGZPzisiDV3DyKB_wGharywrXgHQwda7UCrHgghUsU6XthAZtqTVKcdUCNhNobmM19dDU43te76qYzgMG8oCBPGKgBR_mU66aUiL_GrwaZDofGMXZgs0ZavKobMa5d9IlF97PFOsPz9qCpd6wf5wfHw6ONuBpeE_DON6Excloim-8XzUxb2t4E_j22Bj5DRt5MTE |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security-Aware+and+Privacy-Preserving+D2D+Communications+in+5G&rft.jtitle=IEEE+network&rft.au=Aiqing+Zhang&rft.au=Xiaodong+Lin&rft.date=2017-07-01&rft.pub=IEEE&rft.issn=0890-8044&rft.volume=31&rft.issue=4&rft.spage=70&rft.epage=77&rft_id=info:doi/10.1109%2FMNET.2017.1600290&rft.externalDocID=7994918 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0890-8044&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0890-8044&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0890-8044&client=summon |