Author : DR. D. Karunkuzhali 1
Date of Publication :7th April 2016
Abstract: with the fast development of Device-to-Device (D2D) communications in 4G LTE-Advanced networks and increase in use of smart phone and tablet users, D2D has become an appealing solution for enhancing the security performance of traditional cellular networks. In this paper we enhance the security requirements by implementing Elliptic Curve Diffie Hellman (ECDH) algorithm in D2D. This anonymous key agreement protocol allows two parties to establish a shared secret over an insecure channel. We integrate our proposed protocol into the existing Vehicular Connection Steering (VECOS) Protocol and execute it using simulation.
Reference :
-
- G. Fodor, E. Dahlman, G. Mildh, S. Parkvall, N. Reider, G. Miklos, and Z. Turanyi, “Design aspects of network assisted device-to-device communications,” IEEE Communications Magazine, vol. 50, no. 3, pp. 170-177, 2012.
- D. Wu, J. Wang, R. Q. Hu, Y. Cai, and L. Zhou, “The role of mobility for D2D communications in LTE-Advanced networks: Energy VS. bandwidth efficiency,” IEEE Wireless Communications, vol. 21, no. 4, pp. 66-71, 2014.
- M. Yang, S. Y. Lim, H. J. Park, and N. H. Park, “Solving the data overload: Device-to-device bearer control architecture for cellular data offloading,” IEEE Vehicular Technology Magazine, vol. 8, no. 1, pp. 31- 39, 2013.
- L. Zhou, Y. Wen, H. Wang, and M. Guizani, “Resource allocation with incomplete information for QoE-driven multimedia communications,” IEEE Transactions on Wireless Communications, vol. 12, no. 8, pp. 3733- 3745, 2013.
- L. Zhou, R. Hu, Y. Qian, and H.-H. Chen, “EnergySpectrum efficiency tradeoff for video streaming over mobile Ad Hoc networks,” IEEEJournal on Selected Areas in Communications, vol. 31, no. 5, pp. 981- 991, 2013.
- S. Ryu, S. Park, N. Park, and S. Chung, “Development of device-to-device communication based new mobile proximity multimedia service business models,” IEEE International Conference on Multimedia andExpo Workshops, pp. 1-6, 2013.
- X. Liu, V. Li, and P. Zhang, “Joint radio resource management through vertical handoffs in 4G networks,” in Proc. IEEE GLOBECOM, Nov./Dec. 2006, pp. 1–5.
- 3rd Generation Partnership Project (3GPP), “Study on S2a mobility based on GTP and WLAN access to EPC,” Sophia-Antipolis, France, 3GPP Specifications TR 23.852, 2011.
- 3rd Generation Partnership Project (3GPP), “Architecture enhancements for non-3GPP accesses,” Sophia-Antipolis, France, 3GPP Specifications TS 23.402, 2011.
- A. Nadembega, A. Hafid, and T. Taleb, “A path prediction model to support mobile multimedia streaming,” in Proc. IEEE ICC, Ottawa, ON, Canada, Jun. 2012, pp. 2001–2005
- A. Nadembega, T. Taleb, and A. Hafid, “A destination prediction model based on historical data, contextual knowledge and spatial conceptual maps,” in Proc. IEEEICC,Ottawa, ON, Canada, Jun. 2012, pp. 1416–1420.
- G. Fodor, E. Dahlman, G. Mildh, S. Parkvall, N. Reider, G. Miklos, and Z. Turanyi, “Design aspects of network assisted device-to-device communications,” IEEE Communications Magazine, vol. 50, no. 3, pp.170-177,2012.
- J. Wang, Ch. Li, and J. Wu, “Physical layer security of D2D communications underlaying cellular networks,” Applied Mechanics and Materials, vol. 441, pp. 951-954, 2014.
- D. Zhu, A.L. Swindlehurst, S.A. Fakoorian, W. Xu, and Ch. Zhao, “Device-to-device communications: the physical layer security advantage.” in IEEE ICASSP, 2014