Security in D2D Communications: A Review

Device-to-Device (D2D) communications have emerged as a promising technology for the next generation mobile communication networks and wireless systems (5G). As an underlay network of a conventional cellular network (LTE or LTE-Advanced), D2D communications have shown great potential in improving communication capability, reducing communication delay and power dissipation, and fostering multifarious new applications and services. However, security in D2D communications, which is essential for the success of D2D services, hasn't yet drawn special attention in the literature. In this paper, we analyze security architecture of D2D communications under the framework of 3GPP LTE and identify the security requirements in D2D communications. We survey existing security solutions in D2D communications and evaluate their comprehensiveness and effectivity based on security requirements and D2D security architecture. Finally, we discuss the open research issues for securing D2D communications based on aforementioned security requirements and architecture.

[1]  Xu Chen,et al.  SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[2]  Gary Steri,et al.  Connectivity and security in a D2D communication protocol for public safety applications , 2014, 2014 11th International Symposium on Wireless Communications Systems (ISWCS).

[3]  Qing Wang,et al.  A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.

[4]  Klaus Doppler,et al.  Mode Selection for Device-To-Device Communication Underlaying an LTE-Advanced Network , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[5]  Chuan Ma,et al.  Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.

[6]  Carl Wijting,et al.  Device-to-device communication as an underlay to LTE-advanced networks , 2009, IEEE Communications Magazine.

[7]  Junyi Li,et al.  Toward proximity-aware internetworking , 2010, IEEE Wireless Communications.

[8]  Hao Liang,et al.  Device-to-device communication underlaying converged heterogeneous networks , 2014, IEEE Wireless Communications.

[9]  Wenliang Du,et al.  Cooperative Key Generation in Wireless Networks , 2012, IEEE Journal on Selected Areas in Communications.

[10]  Stefan Parkvall,et al.  Device-to-Device Communications for National Security and Public Safety , 2014, IEEE Access.

[11]  Enrique Festijo,et al.  Joint operation of routing control and group key management for 5G ad hoc D2D networks , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).

[12]  Shaojie Tang,et al.  KEEP: Fast secret key extraction protocol for D2D communication , 2014, 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS).

[13]  Yu Cheng,et al.  Secure key establishment for Device-to-Device communications , 2014, 2014 IEEE Global Communications Conference.

[14]  Mauro Conti,et al.  Secure Message Delivery Games for Device-to-Device Communications , 2014, GameSec.

[15]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[16]  Olav Tirkkonen,et al.  Device-to-Device Communication Underlaying Cellular Communications Systems , 2009, Int. J. Commun. Netw. Syst. Sci..

[17]  Sanjay Shakkottai,et al.  FlashLinQ: A synchronous distributed scheduler for peer-to-peer ad hoc networks , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[18]  Aiqing Zhang,et al.  SeDS: Secure Data Sharing Strategy for D2D Communication in LTE-Advanced Networks , 2016, IEEE Transactions on Vehicular Technology.

[19]  Xuemin Shen,et al.  Operator controlled device-to-device communications in LTE-advanced networks , 2012, IEEE Wireless Communications.

[20]  Yi Sun,et al.  Modeling and Analysis on Access Control for Device-to-Device Communications in Cellular Network: A Network-Calculus-Based Approach , 2016, IEEE Transactions on Vehicular Technology.