Security in device-to-device communications: a survey

被引:38
|
作者
Hamoud, Othmane Nait [1 ,2 ]
Kenaza, Tayeb [1 ]
Challal, Yacine [2 ]
机构
[1] Ecole Militaire Polytech, Dept Comp Sci, BP 17 Bordj Elbahri, Algiers, Algeria
[2] Ecole Natl Super Informat, Algiers, Algeria
关键词
5G mobile communication; cellular radio; telecommunication security; access protocols; telecommunication traffic; energy consumption; next generation networks; device-to-device communications; D2D communications; next generation mobile communication networks; communication delay reduction; energy consumption reduction; traffic load; D2D technology; cellular networks; security issues; wireless communication; critical infrastructure control; personal data; physical layer; MAC layer; network layer; application layer;
D O I
10.1049/iet-net.2017.0119
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Device-to-device (D2D) communication is a promising technology for the next generation mobile communication networks (5G). Indeed, it is expected to allow high throughput, reduce communication delays and reduce energy consumption and traffic load. D2D technology will enhance the capacity and the performance of traditional cellular networks. Security issues must be considered in all types of communications, especially when it comes to wireless communication between devices involved in controlling critical infrastructures and/or dealing with personal data. The authors propose taxonomy based on the review of recent works which have addressed the security issues in D2D communications. This taxonomy is more practical since it gives, on the one hand, a better readability and a good understanding of all the works that have addressed the security issues in the literature, and on the other hand, a roadmap towards a global security solution that combines the best techniques and security solutions inherent to each layer: physical, MAC, network and application.
引用
收藏
页码:14 / 22
页数:9
相关论文
共 50 条
  • [1] Device-to-Device Communications: A Contemporary Survey
    Shah, Syed Tariq
    Hasan, Syed Faraz
    Seet, Boon-Chong
    Chong, Peter Han Joo
    Chung, Min Young
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (01) : 1247 - 1284
  • [2] Device-to-Device Communications: A Contemporary Survey
    Syed Tariq Shah
    Syed Faraz Hasan
    Boon-Chong Seet
    Peter Han Joo Chong
    Min Young Chung
    Wireless Personal Communications, 2018, 98 : 1247 - 1284
  • [3] A Survey on Socially Aware Device-to-Device Communications
    Ahmed, Manzoor
    Li, Yong
    Waqas, Muhammad
    Sheraz, Muhammad
    Jin, Depeng
    Han, Zhu
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (03): : 2169 - 2197
  • [4] DEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE
    Zhu, Daohua
    Swindlehurst, A. Lee
    Fakoorian, S. Ali A.
    Xu, Wei
    Zhao, Chunming
    2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2014,
  • [5] Device-to-Device Communications for National Security and Public Safety
    Fodor, Gabor
    Parkvall, Stefan
    Sorrentino, Stefano
    Wallentin, Pontus
    Lu, Qianxi
    Brahmi, Nadia
    IEEE ACCESS, 2014, 2 : 1510 - 1520
  • [6] Survey on Device-to-Device Communications: Challenges and Design Issues
    Alkurd, Rawan
    Shubair, Raed M.
    Abualhaol, Ibrahim
    2014 IEEE 12TH INTERNATIONAL NEW CIRCUITS AND SYSTEMS CONFERENCE (NEWCAS), 2014, : 361 - 364
  • [7] Video Transmission Using Device-to-Device Communications: A Survey
    Ahmed, Ibtihal
    Ismail, Mahmoud H.
    Hassan, Mohamed S.
    IEEE ACCESS, 2019, 7 (131019-131038) : 131019 - 131038
  • [8] A Survey of Device-to-Device Communications: Research Issues and Challenges
    Jameel, Furqan
    Hamid, Zara
    Jabeen, Farhana
    Zeadally, Sherali
    Javed, Muhammad Awais
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (03): : 2133 - 2168
  • [9] Audio-Based Security Techniques for Secure Device-to-Device Communications
    Chen, Dajiang
    Zhang, Ning
    Wu, Huici
    Zhang, Kuan
    Lu, Rongxing
    Guizani, Mohsen
    IEEE NETWORK, 2022, 36 (06): : 54 - 59
  • [10] Game theoretic path selection to support security in device-to-device communications
    Panaousis, Emmanouil
    Karapistoli, Eirini
    Elsemary, Hadeer
    Alpcan, Tansu
    Khuzani, M. H. R.
    Economides, Anastasios A.
    AD HOC NETWORKS, 2017, 56 : 28 - 42