Security in device-to-device communications: a survey

被引:38
作者
Hamoud, Othmane Nait [1 ,2 ]
Kenaza, Tayeb [1 ]
Challal, Yacine [2 ]
机构
[1] Ecole Militaire Polytech, Dept Comp Sci, BP 17 Bordj Elbahri, Algiers, Algeria
[2] Ecole Natl Super Informat, Algiers, Algeria
关键词
5G mobile communication; cellular radio; telecommunication security; access protocols; telecommunication traffic; energy consumption; next generation networks; device-to-device communications; D2D communications; next generation mobile communication networks; communication delay reduction; energy consumption reduction; traffic load; D2D technology; cellular networks; security issues; wireless communication; critical infrastructure control; personal data; physical layer; MAC layer; network layer; application layer;
D O I
10.1049/iet-net.2017.0119
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Device-to-device (D2D) communication is a promising technology for the next generation mobile communication networks (5G). Indeed, it is expected to allow high throughput, reduce communication delays and reduce energy consumption and traffic load. D2D technology will enhance the capacity and the performance of traditional cellular networks. Security issues must be considered in all types of communications, especially when it comes to wireless communication between devices involved in controlling critical infrastructures and/or dealing with personal data. The authors propose taxonomy based on the review of recent works which have addressed the security issues in D2D communications. This taxonomy is more practical since it gives, on the one hand, a better readability and a good understanding of all the works that have addressed the security issues in the literature, and on the other hand, a roadmap towards a global security solution that combines the best techniques and security solutions inherent to each layer: physical, MAC, network and application.
引用
收藏
页码:14 / 22
页数:9
相关论文
共 56 条
  • [1] 3GPP, 2013, 22803 3GPP TR, V12
  • [2] Abd-Elrahman E, 2015, INT WIREL COMMUN, P616, DOI 10.1109/IWCMC.2015.7289154
  • [3] Abualhaol I, 2016, P ANN HICSS, P5763, DOI 10.1109/HICSS.2016.713
  • [4] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [5] Secure Device-to-Device Communication in LTE-A
    Alam, Muhammad
    Yang, Du
    Rodriguez, Jonathan
    Abd-Alhameed, Raed A.
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (04) : 66 - 73
  • [6] [Anonymous], 2014, 23703 3GPP TR
  • [7] [Anonymous], 2014, 2014 INT C PRIV SEC
  • [8] [Anonymous], 2016, 23303 3GPP TR
  • [9] A Survey on Device-to-Device Communication in Cellular Networks
    Asadi, Arash
    Wang, Qing
    Mancuso, Vincenzo
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04): : 1801 - 1819
  • [10] Bao X, 2013, IEEE INFOCOM SER, P420