A Survey on Security in D2D Communications

Device-to-Device (D2D) communications have emerged as a promising technology for the next generation mobile communication networks and wireless systems (5G). As an underlay network of conventional cellular networks (LTE or LTE-Advanced), D2D communications have shown great potential in improving communication capability, erasing communication delay, reducing power dissipation, and fostering multifarious new applications and services. However, security in D2D communications, which is essential for the success of D2D services, has not yet been seriously studied in the literature. In this paper, we explore a security architecture for D2D communications under the framework of 3GPP LTE. We further investigate potential security threats and specify security requirements accordingly. Existing security solutions in D2D communications are seriously surveyed and evaluated based on the specified security architecture and requirements in order to figure out open research issues and motivate future research efforts.

[1]  Klaus Doppler,et al.  Mode Selection for Device-To-Device Communication Underlaying an LTE-Advanced Network , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[2]  Akshai Aggarwal,et al.  A key management and secure routing integrated framework for Mobile Ad-hoc Networks , 2013, Ad Hoc Networks.

[3]  Zhu Han,et al.  Radio resource allocation for physical-layer security in D2D underlay communications , 2014, 2014 IEEE International Conference on Communications (ICC).

[4]  Roslan Ismail,et al.  Access control and privacy in MANET emergency environment , 2014, 2014 International Conference on Computer and Information Sciences (ICCOINS).

[5]  Erik Dahlman,et al.  UMTS/IMT-2000 based on wideband CDMA , 1998, IEEE Commun. Mag..

[6]  Kyungtae Kang,et al.  Secure Device-to-Device Authentication in Mobile Multi-hop Networks , 2014, WASA.

[7]  Aiqing Zhang,et al.  SeDS: Secure Data Sharing Strategy for D2D Communication in LTE-Advanced Networks , 2016, IEEE Transactions on Vehicular Technology.

[8]  Xu Chen,et al.  Exploiting Social Ties for Cooperative D2D Communications: A Mobile Social Networking Case , 2015, IEEE/ACM Transactions on Networking.

[9]  Zaher Dawy,et al.  Social Network Aware Device-to-Device Communication in Wireless Networks , 2015, IEEE Transactions on Wireless Communications.

[10]  R. Pushpa Lakshmi,et al.  Parallel key management scheme for mobile ad hoc network based on traffic mining , 2015, IET Inf. Secur..

[11]  M. Murali,et al.  Cached data access in MANET employing AODV protocol , 2015, 2015 International Conference on Computer, Communication and Control (IC4).

[12]  Qianbin Chen,et al.  A Priority-Based Access Control Model for Device-to-Device Communications Underlaying Cellular Network Using Network Calculus , 2014, WASA.

[13]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[14]  Chai-Keong Toh,et al.  Ad Hoc Mobile Wireless Networks , 2002 .

[15]  Qing Wang,et al.  A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.

[16]  Raed A. Abd-Alhameed,et al.  Secure device-to-device communication in LTE-A , 2014, IEEE Communications Magazine.

[17]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[18]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[19]  Junyi Li,et al.  Toward proximity-aware internetworking , 2010, IEEE Wireless Communications.

[20]  Wenliang Du,et al.  Cooperative Key Generation in Wireless Networks , 2012, IEEE Journal on Selected Areas in Communications.

[21]  Enrique Festijo,et al.  Joint operation of routing control and group key management for 5G ad hoc D2D networks , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).

[22]  Lingyang Song,et al.  Physical Layer Security in Wireless Communications , 2013 .

[23]  Shaojie Tang,et al.  KEEP: Fast secret key extraction protocol for D2D communication , 2014, 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS).

[24]  Mohsen Guizani,et al.  A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.

[25]  Yi Sun,et al.  Modeling and Analysis on Access Control for Device-to-Device Communications in Cellular Network: A Network-Calculus-Based Approach , 2016, IEEE Transactions on Vehicular Technology.

[26]  Sandeep K. S. Gupta,et al.  Improving on-demand data access efficiency in MANETs with cooperative caching , 2009, Ad Hoc Networks.

[27]  Hao Liang,et al.  Device-to-device communication underlaying converged heterogeneous networks , 2014, IEEE Wireless Communications.

[28]  林咨铭,et al.  Authentication system for device-to-device communication and authentication method therefore , 2013 .

[29]  Stefan Parkvall,et al.  Device-to-Device Communications for National Security and Public Safety , 2014, IEEE Access.

[30]  Chuan Ma,et al.  Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.

[31]  Stefania Sesia,et al.  LTE - The UMTS Long Term Evolution, Second Edition , 2011 .

[32]  Xuemin Shen,et al.  Operator controlled device-to-device communications in LTE-advanced networks , 2012, IEEE Wireless Communications.

[33]  Zheng Yan,et al.  PSNController: An Unwanted Content Control System in Pervasive Social Networking Based on Trust Management , 2015, ACM Trans. Multim. Comput. Commun. Appl..

[34]  Gary Steri,et al.  Connectivity and security in a D2D communication protocol for public safety applications , 2014, 2014 11th International Symposium on Wireless Communications Systems (ISWCS).

[35]  Yu Cheng,et al.  Secure key establishment for Device-to-Device communications , 2014, 2014 IEEE Global Communications Conference.

[36]  Zheng Yan,et al.  Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels , 2017, IEEE Systems Journal.

[37]  Mahalingam Ramkumar,et al.  An efficient key predistribution scheme for ad hoc network security , 2005, IEEE Journal on Selected Areas in Communications.

[38]  Feng Li,et al.  A study of stealthy denial-of-service attacks in Wi-Fi direct device-to-device networks , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).

[39]  Olav Tirkkonen,et al.  Device-to-Device Communication Underlaying Cellular Communications Systems , 2009, Int. J. Commun. Netw. Syst. Sci..

[40]  Panagiotis Papadimitratos,et al.  Secure data communication in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[41]  Jeong Hyun Yi,et al.  Identity-Based Access Control for Ad Hoc Groups , 2004, ICISC.

[42]  Mauro Conti,et al.  Secure Message Delivery Games for Device-to-Device Communications , 2014, GameSec.

[43]  P. Khatri,et al.  A Survey on Security issues in Mobile ADHOC networks , 2009 .

[44]  Sanjay Shakkottai,et al.  FlashLinQ: A synchronous distributed scheduler for peer-to-peer ad hoc networks , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[45]  Thomas Haug,et al.  The GSM System for Mobile Communications , 1992 .

[46]  Carl Wijting,et al.  Device-to-device communication as an underlay to LTE-advanced networks , 2009, IEEE Communications Magazine.

[47]  Hsiao-Hwa Chen,et al.  M2M Communications in 3GPP LTE/LTE-A Networks: Architectures, Service Requirements, Challenges, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[48]  Wei Xu,et al.  Device-to-device communications: The physical layer security advantage , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[49]  C.-C. Jay Kuo,et al.  Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.

[50]  Xu Chen,et al.  SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[51]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..