Securing D2D wireless links by continuous authenticity with legitimacy patterns
Device-to-Device (D2D) communications enables the efficient use of wireless system resources (i.e., power and spectrum) and promotes users' privacy but may increase the likelihood of cyber-attacks due to the lack of security infrastructure. This paper utilizes continuous authenticity to develop a security-scoring measure that can evaluate and help improve the security of current D2D wireless systems, and improve the design of 5G future systems, such as LTE-Direct. Simulation results are presented to show the feasibility of implementing the proposed security-scoring using legitimacy patterns, and to compare security-scoring results from static and random allocation of legitimacy patterns. Future legitimacy patterns could account for both technical considerations and human behavior to achieve higher performance.
|Keywords||Authentication, Device-to-device wireless security, Physical layer security, Security scoring|
|Conference||49th Annual Hawaii International Conference on System Sciences, HICSS 2016|
Abualhaol, I. (Ibrahim), & Muegge, S. (2016). Securing D2D wireless links by continuous authenticity with legitimacy patterns. Presented at the 49th Annual Hawaii International Conference on System Sciences, HICSS 2016. doi:10.1109/HICSS.2016.713