Security-Aware and Privacy-Preserving D2D Communications in 5G

Device-to-device communication is a promising technology that can offload heavy traffic in 5G networks. However, due to its open nature, there are several security issues. The LTE-A standard introduces security and protection mechanisms, which include mutual authentication between the UEs and the eNB. Unfortunately, D2D communications still face various threats: jamming, data modification, free-riding, and privacy violation. In this article, we first give an architecture for an LTE-D2D system and its application scenarios with various security threats and requirements. Then we investigate privacy concerns in terms of location privacy, identity privacy, and data privacy. Afterward, we propose security solutions from aspects of application-layer security and physical-layer security, respectively. Further, we propose two frameworks for cross-application-physical-layer security methods. Finally, the challenges and future research directions are presented.

[1]  Aiqing Zhang,et al.  SeDS: Secure Data Sharing Strategy for D2D Communication in LTE-Advanced Networks , 2016, IEEE Transactions on Vehicular Technology.

[2]  Nei Kato,et al.  Device-to-device communications for enhancing quality of experience in software defined multi-tier LTE-A networks , 2015, IEEE Network.

[3]  Aydin Sezgin,et al.  Fundamental limits of caching in D2D networks with secure delivery , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[4]  Chuan Ma,et al.  Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.

[5]  Junyi Li,et al.  Toward proximity-aware internetworking , 2010, IEEE Wireless Communications.

[6]  Zhu Han,et al.  Radio resource allocation for physical-layer security in D2D underlay communications , 2014, 2014 IEEE International Conference on Communications (ICC).

[7]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[8]  Aiqing Zhang,et al.  Security-Aware Device-to-Device Communications Underlaying Cellular Networks , 2016, SpringerBriefs in Electrical and Computer Engineering.

[9]  H. Vincent Poor,et al.  The Gaussian wiretap channel with a helping interferer , 2008, 2008 IEEE International Symposium on Information Theory.

[10]  Hong Wen,et al.  Physical layer assist authentication technique for smart meter system , 2013, IET Commun..

[11]  G. Loewenstein,et al.  Privacy and human behavior in the age of information , 2015, Science.

[12]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[13]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[14]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2013, IEEE Trans. Mob. Comput..

[15]  Zhu Han,et al.  Radio Resource Allocation for Device-to-Device Underlay Communications , 2018 .