GRAAD: Group Anonymous and Accountable D2D Communication in Mobile Networks

被引:34
|
作者
Hsu, Ruei-Hau [1 ,2 ]
Lee, Jemin [3 ]
Quek, Tony Q. S. [4 ]
Chen, Jyh-Cheng [5 ]
机构
[1] Singapore Univ Technol & Design, iTrust, Ctr Res Cyber Secur, Singapore 487372, Singapore
[2] Agcy Sci Technol & Res, Data Storage Inst, Singapore 138634, Singapore
[3] Daegu Gyeongbuk Inst Sci & Technol, Dept Informat & Commun Engn, Daegu 43016, South Korea
[4] Singapore Univ Technol & Design, Informat Syst Technol & Design Pillar, Singapore 487372, Singapore
[5] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
基金
新加坡国家研究基金会;
关键词
D2D communication; proximity service; group anonymity; mutual authentication; end-to-end security; AUTHENTICATION SCHEME; SECRET HANDSHAKES; PROTOCOLS; SECURITY;
D O I
10.1109/TIFS.2017.2756567
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Device-to-device (D2D) communication is mainly launched by the transmission requirements between devices for specific applications such as proximity services in long-term evolution advanced networks, and each application will form a group of registered devices for the network-covered and network-absent D2D communications. During the applications of D2D communication, each device needs to identify the other devices of the same group in proximity by their group identity. This leads to the exposure of group information, by which the usage of applications can be analyzed by eavesdroppers. Hence, this paper introduces network-covered and network-absent authenticated key exchange protocols for D2D communications to guarantee accountable group anonymity, end-to-end security to network operators, as well as traceability and revocability for accounting and management requirements. We formally prove the security of those protocols, and also develop an analytic model to evaluate the quality of authentication protocols by authentication success rate in D2D communications. Besides, we implement the proposed protocols on android mobile devices to evaluate the computation costs of the protocols. We also evaluate the authentication success rate by the proposed analytic model and prove the correctness of the analytic model via simulation. Those evaluations show that the proposed protocols are feasible to the performance requirements of D2D communications.
引用
收藏
页码:449 / 464
页数:16
相关论文
共 50 条
  • [1] Group Anonymous D2D Authenticated Key Exchange Protocol for Mobile Networks
    Sudhakar, T.
    Natarajan, V
    Narayanan, G.
    [J]. 2019 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC 2019), 2019, : 381 - 385
  • [2] Group Anonymous D2D Communication with End-to-End Security in LTE-A
    Hsu, Ruei-Hau
    Lee, Jemin
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 451 - 459
  • [3] Cellular Offloading in Heterogeneous Mobile Networks With D2D Communication Assistance
    Cao, Wei
    Feng, Gang
    Qin, Shuang
    Yan, Mu
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (05) : 4245 - 4255
  • [4] Anonymous group communication in mobile networks
    Cimato, S
    D'Arco, P
    Visconti, I
    [J]. THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2003, 2841 : 316 - 328
  • [5] Connectivity Times for Mobile D2D Networks
    Smith, Peter
    Coon, Justin
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [6] Efficient Resource Allocation for Mobile Social Networks in D2D Communication Underlaying Cellular Networks
    Sun, Yue
    Wang, Tianyu
    Song, Lingyang
    Han, Zhu
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 2466 - 2471
  • [7] Chaotic Deep Network for Mobile D2D Communication
    Li, Lixiang
    Chen, Yixin
    Peng, Haipeng
    Yang, Yixian
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (10): : 8078 - 8096
  • [8] Analysis of transmission capacity for multi-mode D2D communication in mobile networks
    Lin, Zhijian
    Huang, Lianfen
    Li, Yujie
    Chao, Han-Chieh
    Chen, Pingping
    [J]. PERVASIVE AND MOBILE COMPUTING, 2017, 41 : 179 - 191
  • [9] Resource Allocation for D2D Communications in Mobile Networks
    Hussein, Bassam
    Samhat, Abed Ellatif
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTER AND APPLICATIONS (ICCA), 2018, : 253 - 259
  • [10] D2D Communication for Disaster Recovery in Cellular Networks
    Gao, Hui
    Shen, Yulong
    Yang, Bin
    [J]. 2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 292 - 295