TY - GEN
T1 - Fast group discovery and non-repudiation in D2D communications using IBE
AU - Abd-Elrahman, Emad
AU - Ibn-Khedher, Hatem
AU - Afifi, Hossam
AU - Toukabri, Thouraya
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/10/2
Y1 - 2015/10/2
N2 - Proximity services discovery using LTE-based Device-to-Device (D2D) communications has been recently in the heart of the discussions about the advent of 5G networks. Meanwhile, their related security aspects are of a major concern especially when dealing with direct radio communications and large-scale deployment of D2D. Yet, existing security algorithms and solutions are not adapted to these emerging new types of communications. This paper is focused on D2D communications' security issues in both discovery and communication phases. First, we address the global security stakes and challenges in D2D. Then, a solution based on the Identity-Based Encryption (IBE) mechanism is proposed to secure the exchanged D2D messages during the discovery and communication phases. The proposed solution is discussed under two D2D use cases and is further used to introduce an efficient key management system for group communication. Finally, a security requirements analysis is presented in order to evaluate the scalability and efficiency levels of the proposed solution.
AB - Proximity services discovery using LTE-based Device-to-Device (D2D) communications has been recently in the heart of the discussions about the advent of 5G networks. Meanwhile, their related security aspects are of a major concern especially when dealing with direct radio communications and large-scale deployment of D2D. Yet, existing security algorithms and solutions are not adapted to these emerging new types of communications. This paper is focused on D2D communications' security issues in both discovery and communication phases. First, we address the global security stakes and challenges in D2D. Then, a solution based on the Identity-Based Encryption (IBE) mechanism is proposed to secure the exchanged D2D messages during the discovery and communication phases. The proposed solution is discussed under two D2D use cases and is further used to introduce an efficient key management system for group communication. Finally, a security requirements analysis is presented in order to evaluate the scalability and efficiency levels of the proposed solution.
KW - Device-to-Device communications
KW - Identity Based Encryption (IBE)
KW - LTE
KW - Security
U2 - 10.1109/IWCMC.2015.7289154
DO - 10.1109/IWCMC.2015.7289154
M3 - Conference contribution
AN - SCOPUS:84949489871
T3 - IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference
SP - 616
EP - 621
BT - IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 11th International Wireless Communications and Mobile Computing Conference, IWCMC 2015
Y2 - 24 August 2015 through 28 August 2015
ER -