scispace - formally typeset
Open AccessJournal ArticleDOI

Sec-D2D: A Secure and Lightweight D2D Communication System With Multiple Sensors

Reads0
Chats0
TLDR
A lightweight and efficient key distribution scheme for secure D2D communication is proposed by leveraging an acceleration sensor equipped in two wireless devices, and an efficient near-field authentication is developed with a speaker and a microphone.
Abstract
Device-to-Device (D2D) communication is a promising method for the emerging Internet of Things. Secure information exchange plays a key role in the application of D2D communication. Considering that the wireless devices are powered by batteries, in this paper, a lightweight secure D2D system is designed by using multiple sensors on mobile devices. Specifically, by leveraging an acceleration sensor equipped in two wireless devices, a lightweight and efficient key distribution scheme for secure D2D communication is proposed. Based on the distributed secure key, an efficient near-field authentication is developed with a speaker and a microphone to determine whether these two devices are physically close; and a secure information exchange scheme with high efficiency, which includes message encryption/decryption and message authentication, is presented over the audio channel and the RF channel. The Extensive experiments are provided to demonstrate that our system can achieve a secure information exchange between two wireless devices with low energy consumption and computing resources.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Security Considerations for Internet of Things: A Survey

TL;DR: This survey identifies the general threat and attack vectors against IoT devices while highlighting the flaws and weak points that can lead to breaching the security.
Journal ArticleDOI

Secure D2D Communication for 5G IoT Network Based on Lightweight Cryptography

TL;DR: The proposed secure D2D communication was designed based on elliptic curve cryptography (ECC) and lightweight authenticated encryption with associated data (AEAD) ciphers to cover resource-constrained IoT devices.
Journal ArticleDOI

Device-To-Device Communication in 5G Environment: Issues, Solutions, and Challenges

TL;DR: The main goal of the research is to present an extensive review of the recent advances in various D2D domains such as the discovery process, mode selection schemes, interference management, power control techniques and finally the mode selection for D1D applications for 5G technologies.
Journal ArticleDOI

A Resource Sharing Scheme for Intercell D2D Communication in Cellular Networks: A Repeated Game Theoretic Approach

TL;DR: This paper presents a dynamic Resource-Block (RB) sharing scheme between the D2D users and cellular users in a multi-cell cellular network, and shows a marked improvement in throughput of the overall system.
Journal ArticleDOI

Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis

TL;DR: Security analysis and performance analysis proves that the proposed scheme is efficient compared with state-of-the-art D2D authentication schemes, and can provide adequate security properties as well as resistance to various attacks.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.

The Kerberos Network Authentication Service (V5)

J. Kohl, +1 more
TL;DR: This document gives an overview and specification of Version 5 of the protocol for the Kerberos network authentication system, presently in production use at MIT's Project Athena, and at other Internet sites.
Journal ArticleDOI

Operator controlled device-to-device communications in LTE-advanced networks

TL;DR: This article studies direct communications between user equipments in the LTE-advanced cellular networks to provide better user experience and make profit accordingly.
Proceedings ArticleDOI

Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts

TL;DR: This work proposes context proximity for selective artefact communication, using the context of artefacts for matchmaking, and suggests to empower users with simple but effective means to impose the same context on a number of artefacts.
Proceedings ArticleDOI

Robust key generation from signal envelopes in wireless networks

TL;DR: This paper presents a novel approach that couples the physical layer characteristics of wireless networks with key generation algorithms based on the wireless communication phenomenon known as the principle of reciprocity which states that in the absence of interference both transmitter and receiver experience the same signal envelope.
Related Papers (5)