Result: Securing D2D Wireless Links by Continuous Authenticity with Legitimacy Patterns
Further Information
Device-to-Device (D2D) communications enables the efficient use of wireless system resources (i.e., power and spectrum) and promotes users' privacy but may increase the likelihood of cyber-attacks due to the lack of security infrastructure. This paper utilizes continuous authenticity to develop a security-scoring measure that can evaluate and help improve the security of current D2D wireless systems, and improve the design of 5G future systems, such as LTE-Direct. Simulation results are presented to show the feasibility of implementing the proposed security-scoring using legitimacy patterns, and to compare security-scoring results from static and random allocation of legitimacy patterns. Future legitimacy patterns could account for both technical considerations and human behavior to achieve higher performance.