Result: Securing D2D Wireless Links by Continuous Authenticity with Legitimacy Patterns

Title:
Securing D2D Wireless Links by Continuous Authenticity with Legitimacy Patterns
Source:
2016 49th Hawaii International Conference on System Sciences (HICSS). :5763-5771
Publisher Information:
IEEE, 2016.
Publication Year:
2016
Document Type:
Academic journal Article
DOI:
10.1109/hicss.2016.713
Accession Number:
edsair.doi.dedup.....e4b2118c9e4a2ef38ef7e22ba78b6d0c
Database:
OpenAIRE

Further Information

Device-to-Device (D2D) communications enables the efficient use of wireless system resources (i.e., power and spectrum) and promotes users' privacy but may increase the likelihood of cyber-attacks due to the lack of security infrastructure. This paper utilizes continuous authenticity to develop a security-scoring measure that can evaluate and help improve the security of current D2D wireless systems, and improve the design of 5G future systems, such as LTE-Direct. Simulation results are presented to show the feasibility of implementing the proposed security-scoring using legitimacy patterns, and to compare security-scoring results from static and random allocation of legitimacy patterns. Future legitimacy patterns could account for both technical considerations and human behavior to achieve higher performance.