SeDS: Secure Data Sharing Strategy for D2D Communication in LTE-Advanced Networks

被引:91
作者
Zhang, Aiqing [1 ,2 ]
Chen, Jianxin [1 ]
Hu, Rose Qingyang [3 ]
Qian, Yi [4 ]
机构
[1] Nanjing Univ Posts & Telecommun, Minist Educ, Key Lab Broadband Wireless Commun & Sensor Networ, Nanjing 210003, Jiangsu, Peoples R China
[2] Anhui Normal Univ, Wuhu 241000, Anhui, Peoples R China
[3] Utah State Univ, Dept Elect & Comp Engn, Logan, UT 84322 USA
[4] Univ Nebraska, Dept Elect & Comp Engn, Omaha, NE 68182 USA
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Availability; data sharing; device-to-device (D2D) communication; Long-Term Evolution Advanced (LTE-A) network; security; PRIVACY; PROTOCOL;
D O I
10.1109/TVT.2015.2416002
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security and availability are two crucial issues in device-to-device (D2D) communication, with its fast development in fourth-generation (4G) Long-Term Evolution Advanced (LTE-Advanced) networks. In this paper, we propose a secure data sharing protocol, which merges the advantages of public key cryptography and symmetric encryption, to achieve data security in D2D communication. Specifically, a public-key-based digital signature, combined with a mutual authentication mechanism of a cellular network, guarantees entity authentication, transmission nonrepudiation, traceability, data authority, and integrity. Meanwhile, symmetric encryption is employed to ensure data confidentiality. A salient feature of the proposed protocol is that it can detect free-riding attack by keeping a record of the current status for user equipment (UE) and realize reception nonrepudiation by key hint transmission between the UE and evolved NodeB, thus improving system availability. Furthermore, various delay models are established in different application scenarios to seek the optimal initial service providers (SPs) for achieving tradeoff between cost and availability. Extensive analysis and simulations demonstrate that the proposed protocol is indeed an efficient and practical solution for a secure data sharing mechanism for D2D communication.
引用
收藏
页码:2659 / 2672
页数:14
相关论文
共 32 条
[1]  
[Anonymous], 2011, IJ NETWORK SECURITY
[2]  
[Anonymous], EFFICIENT IMPLEMENTA
[3]  
[Anonymous], P IEEE INT C MULT EX
[4]  
[Anonymous], QUEUING SYSTEMS VOLU
[5]  
[Anonymous], P ACM INT S MOBIHOC
[6]  
[Anonymous], PEER TO PEER NETW AP
[7]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[8]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[9]   LTE-ADVANCED: NEXT-GENERATION WIRELESS BROADBAND TECHNOLOGY [J].
Ghosh, Amitava ;
Ratasuk, Rapeepat ;
Mondal, Bishwarup ;
Mangalvedhe, Nitin ;
Thomas, Tim .
IEEE WIRELESS COMMUNICATIONS, 2010, 17 (03) :10-22
[10]   Secure Cooperative Data Downloading in Vehicular Ad Hoc Networks [J].
Hao, Yong ;
Tang, Jin ;
Cheng, Yu .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :523-537