A. Ometov, K. Zhidanov, S. Bezzateev, R. Florea, S. Andreev, Y. Koucheryavy
{"title":"保护网络辅助直接通信:不可靠蜂窝连接的情况","authors":"A. Ometov, K. Zhidanov, S. Bezzateev, R. Florea, S. Andreev, Y. Koucheryavy","doi":"10.1109/Trustcom.2015.453","DOIUrl":null,"url":null,"abstract":"Network-assisted device-to-device (D2D) communication is a next-generation wireless technology enabling direct connectivity between proximate user devices under the control of cellular infrastructure. It couples together the centralized and the distributed network architectures, and as such requires respective enablers for secure, private, and trusted data exchange especially when cellular control link is not available at all times. In this work, we conduct the state-of-the-art overview and propose a novel algorithm to maintain security functions of proximate devices in case of unreliable cellular connectivity, whether a new device joins the secure group of users or an existing device leaves it. Our proposed solution and its rigorous mathematical implementation detailed in this work open door to a novel generation of secure proximity-based services and applications in future wireless communication systems.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"25","resultStr":"{\"title\":\"Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular Connectivity\",\"authors\":\"A. Ometov, K. Zhidanov, S. Bezzateev, R. Florea, S. Andreev, Y. Koucheryavy\",\"doi\":\"10.1109/Trustcom.2015.453\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network-assisted device-to-device (D2D) communication is a next-generation wireless technology enabling direct connectivity between proximate user devices under the control of cellular infrastructure. It couples together the centralized and the distributed network architectures, and as such requires respective enablers for secure, private, and trusted data exchange especially when cellular control link is not available at all times. In this work, we conduct the state-of-the-art overview and propose a novel algorithm to maintain security functions of proximate devices in case of unreliable cellular connectivity, whether a new device joins the secure group of users or an existing device leaves it. Our proposed solution and its rigorous mathematical implementation detailed in this work open door to a novel generation of secure proximity-based services and applications in future wireless communication systems.\",\"PeriodicalId\":277092,\"journal\":{\"name\":\"2015 IEEE Trustcom/BigDataSE/ISPA\",\"volume\":\"46 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-08-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"25\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE Trustcom/BigDataSE/ISPA\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/Trustcom.2015.453\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE Trustcom/BigDataSE/ISPA","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Trustcom.2015.453","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular Connectivity
Network-assisted device-to-device (D2D) communication is a next-generation wireless technology enabling direct connectivity between proximate user devices under the control of cellular infrastructure. It couples together the centralized and the distributed network architectures, and as such requires respective enablers for secure, private, and trusted data exchange especially when cellular control link is not available at all times. In this work, we conduct the state-of-the-art overview and propose a novel algorithm to maintain security functions of proximate devices in case of unreliable cellular connectivity, whether a new device joins the secure group of users or an existing device leaves it. Our proposed solution and its rigorous mathematical implementation detailed in this work open door to a novel generation of secure proximity-based services and applications in future wireless communication systems.