Device-to-Device (D2D) communications enables the efficient use of wireless system resources (i.e., power and spectrum) and promotes users' privacy but may increase the likelihood of cyber-attacks due to the lack of security infrastructure. This paper utilizes continuous authenticity to develop a security-scoring measure that can evaluate and help improve the security of current D2D wireless systems, and improve the design of 5G future systems, such as LTE-Direct. Simulation results are presented to show the feasibility of implementing the proposed security-scoring using legitimacy patterns, and to compare security-scoring results from static and random allocation of legitimacy patterns. Future legitimacy patterns could account for both technical considerations and human behavior to achieve higher performance.

Additional Metadata
Keywords Authentication, Device-to-device wireless security, Physical layer security, Security scoring
Persistent URL dx.doi.org/10.1109/HICSS.2016.713
Conference 49th Annual Hawaii International Conference on System Sciences, HICSS 2016
Citation
Abualhaol, I. (Ibrahim), & Muegge, S. (2016). Securing D2D wireless links by continuous authenticity with legitimacy patterns. Presented at the 49th Annual Hawaii International Conference on System Sciences, HICSS 2016. doi:10.1109/HICSS.2016.713