Authorization based on mobile whitelist in devices for device-to-device communications

In mobile networking, D2D (Device-to-Device) communication extends the network beyond the reliance of existing base stations and provides a flexible data exchange. In other words, D2D allows short range communications to be collected for short range service support in a network. Main challenges in this communication environment include threats from third party devices and unnecessary calculations for communication. In this paper, we propose a method to secure communication focused on security and privacy by establishing a specialized authentication connection in D2D based in light of previous studies. Therefore, we use a device whitelist mechanism to secure communication protocols in order to prevent personal information leaks, denial of service, and masquerading that may occur in mobile communications. Consequently, we created a protocol that introduces the concept of whitelist permission to enhance device communication security. This study confirms that the risk of existing D2D and the incessant short distance communication overhead can be lowered and security can be increased.

[1]  Sherali Zeadally,et al.  Intelligent Device-to-Device Communication in the Internet of Things , 2016, IEEE Systems Journal.

[2]  Qing Wang,et al.  A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.

[3]  Jörg Ott,et al.  Security and Privacy in Device-to-Device (D2D) Communication: A Review , 2017, IEEE Communications Surveys & Tutorials.

[4]  Giovanni Stea,et al.  Simulating device-to-device communications in OMNeT++ with SimuLTE: scenarios and configurations , 2016, ArXiv.

[5]  HoonJae Lee,et al.  A Lightweight Secure iSCSI-based Remote Storage Service for Mobile Devices , 2007, 2007 Second International Conference on Communications and Networking in China.

[6]  Abdullahi Arabo Mobile App Collusions and Its Cyber Security Implications , 2016, 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud).

[7]  Engy M. Maher,et al.  Device-to-Device Communication Distance Analysis in Interference Limited Cellular Networks , 2013, ISWCS.

[8]  Nei Kato On device-to-device (D2D) communication [Editor's note] , 2016, IEEE Netw..

[9]  George Kornaros,et al.  Towards Trusted Apps platforms for open CPS , 2016, 2016 3rd International Workshop on Emerging Ideas and Trends in Engineering of Cyber-Physical Systems (EITEC).

[10]  Himanshu Pareek Application Whitelisting: Approaches and Challenges , 2012 .

[11]  Karim O. Elish,et al.  On the Need of Precise Inter-App ICC Classification for Detecting Android , 2015 .

[12]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .

[13]  Halim Yanikomeroglu,et al.  Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions , 2014, IEEE Communications Magazine.