Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular Connectivity

Network-assisted device-to-device (D2D) communication is a next-generation wireless technology enabling direct connectivity between proximate user devices under the control of cellular infrastructure. It couples together the centralized and the distributed network architectures, and as such requires respective enablers for secure, private, and trusted data exchange especially when cellular control link is not available at all times. In this work, we conduct the state-of-the-art overview and propose a novel algorithm to maintain security functions of proximate devices in case of unreliable cellular connectivity, whether a new device joins the secure group of users or an existing device leaves it. Our proposed solution and its rigorous mathematical implementation detailed in this work open door to a novel generation of secure proximity-based services and applications in future wireless communication systems.

[1]  Wen-Tsuen Chen,et al.  Secure Broadcasting Using the Secure Lock , 1989, IEEE Trans. Software Eng..

[2]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[3]  Cunsheng Ding,et al.  Secret sharing schemes from three classes of linear codes , 2006, IEEE Transactions on Information Theory.

[4]  Ying Wang,et al.  An ID-based broadcast encryption scheme for key distribution , 2005, IEEE Trans. Broadcast..

[5]  Jan Willemson,et al.  Privacy-Preserving Wireless Medical Sensor Network , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[6]  Robert J. McEliece,et al.  A public key cryptosystem based on algebraic coding theory , 1978 .

[7]  Reihaneh Safavi-Naini,et al.  Democratic Key Escrow Scheme , 1997, ACISP.

[8]  Carlisle Adams,et al.  Understanding PKI: Concepts, Standards, and Deployment Considerations , 1999 .

[9]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[10]  Stefan Parkvall,et al.  Device-to-Device Communications for National Security and Public Safety , 2014, IEEE Access.

[11]  Patrick D. McDaniel,et al.  Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.

[12]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[13]  William A. Arbaugh,et al.  Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[14]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[15]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[16]  Michael N. Johnstone,et al.  Security Aspects of Military Sensor-Based Defence Systems , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[17]  Srdjan Capkun,et al.  The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.

[18]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[19]  R. J. McEliece,et al.  On sharing secrets and Reed-Solomon codes , 1981, CACM.

[20]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[21]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[22]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[23]  Olga Galinina,et al.  Cellular traffic offloading onto network-assisted device-to-device connections , 2014, IEEE Communications Magazine.

[24]  Jeong Hyun Yi,et al.  On the utility of distributed cryptography in P2P and MANETs: the case of membership control , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..

[25]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[26]  James L. Massey,et al.  Minimal Codewords and Secret Sharing , 1999 .

[27]  Jing Deng,et al.  Wireless ad hoc networks , 2003 .

[28]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[29]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.

[30]  Lars R. Knudsen,et al.  The Interpolation Attack on Block Ciphers , 1997, FSE.