Mobile network security needs more attention to meet new emerging situations and applications that use modern technologies such as Device to Device (D2D) communications. One of these situations is getting the connection back securely between out of coverage (OoC) stations and the core network. This paper proposes a framework to reestablish this connection by using some of in-coverage stations, which are located at the edge of the injured area. The framework uses Software-defined Network (SDN) architecture. The local controllers (LCs), within SDN, plan the communications by selecting cluster heads (CHs) inside the injured area to begin D2D communications between these stations and the CHs, under the authority of the core network. In our framework, an effect of Free Riding Attack (FRA) can be mitigated. In addition, the privacy of user entity (UE) is achieved by decoupling the transmitted ID and the ID which is used in calculations. Furthermore, we accomplish secure connections between OoC UEs and the core network, with many security objectives such as data origin authentication, entity authentication and other security goals.
Published in | American Journal of Electrical and Computer Engineering (Volume 1, Issue 1) |
DOI | 10.11648/j.ajece.20170101.16 |
Page(s) | 40-49 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2017. Published by Science Publishing Group |
D2D Communication, Free Riding Attack, MIKKY-SAKKE Algorithm, Radio Bearer
[1] | Beyond LTE: Enabling the Mobile Broadband Explosion, Rysavy Research/4G Americas, August 2015. |
[2] | RFC 6509; MIKEY-SAKKE: Sakai-Kasahara Key Encryption in Multimedia Internet KEYing (MIKEY). |
[3] | 3GPP TR 33.833 V1.7.0 (2016-02); 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on Security issues to support Proximity Services (ProSe) (Release 13). |
[4] | RFC 6507; Elliptic Curve-Based Certificateless Signaturesfor Identity-Based Encryption (ECCSI). |
[5] | M. Wang and Z. Yan, “Security in D2D Communications: A Review”, IEEE computer society, 2015. |
[6] | RFC 6508; Sakai-Kasahara Key Encryption (SAKKE). |
[7] | SeDS: Secure Data Sharing Strategy for D2D Communication in LTE-Advanced Networks; Aiqing Zhang, Student Member, IEEE, Jianxin Chen, Member, IEEE, Rose Qingyang Hu, Senior Member, IEEE, and Yi Qian, Senior Member, IEEE. |
[8] | Secure Key Establishment for Device-to-Device Communications Wenlong Shen, Weisheng Hong, Xianghui Cao, Bo Yin, Devu Manikantan Shilaand Yu Cheng; 2014. |
[9] | Connectivity and Security in a D2D Communication Protocol for Public Safety Applications; Leonardo Goratti, Gary Steri, Karina M. Gomez and Gianmarco Baldini; CREATE-NET Research Centre, Trento, Italy; 2014. |
[10] | SYNERGY; A Game-Theoretical Approach for Cooperative Key Generation in Wireless Networks Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan; 2014. |
[11] | KEEP: Fast Secret Key Extraction Protocol for D2D Communication Wei Xi, Xiang-Yang Li, Chen Qian, Jinsong Han, Shaojie Tang, Jizhong Zhao, Kun Zhao; 2014. |
[12] | Secure Message Delivery Games for Device-to-Device Communications; Emmanouil Panaousis, Tansu Alpcan, Hossein Fereidooni, and Mauro Conti; 2014. |
[13] | Descendant of LEACH Based Routing Protocols in Wireless Sensor Networks; Rajendra Prasad Mahapatra, Rakesh Kumar Yadav; 2015. |
[14] | 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Stage 3 (Release 8); 2009. |
APA Style
Firas Masoud, Mohammad Alchaita, Mohammad Assora. (2017). Secure Device to Device Communications for Next-Generation Networks Using Software-Defined Network. American Journal of Electrical and Computer Engineering, 1(1), 40-49. https://doi.org/10.11648/j.ajece.20170101.16
ACS Style
Firas Masoud; Mohammad Alchaita; Mohammad Assora. Secure Device to Device Communications for Next-Generation Networks Using Software-Defined Network. Am. J. Electr. Comput. Eng. 2017, 1(1), 40-49. doi: 10.11648/j.ajece.20170101.16
@article{10.11648/j.ajece.20170101.16, author = {Firas Masoud and Mohammad Alchaita and Mohammad Assora}, title = {Secure Device to Device Communications for Next-Generation Networks Using Software-Defined Network}, journal = {American Journal of Electrical and Computer Engineering}, volume = {1}, number = {1}, pages = {40-49}, doi = {10.11648/j.ajece.20170101.16}, url = {https://doi.org/10.11648/j.ajece.20170101.16}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajece.20170101.16}, abstract = {Mobile network security needs more attention to meet new emerging situations and applications that use modern technologies such as Device to Device (D2D) communications. One of these situations is getting the connection back securely between out of coverage (OoC) stations and the core network. This paper proposes a framework to reestablish this connection by using some of in-coverage stations, which are located at the edge of the injured area. The framework uses Software-defined Network (SDN) architecture. The local controllers (LCs), within SDN, plan the communications by selecting cluster heads (CHs) inside the injured area to begin D2D communications between these stations and the CHs, under the authority of the core network. In our framework, an effect of Free Riding Attack (FRA) can be mitigated. In addition, the privacy of user entity (UE) is achieved by decoupling the transmitted ID and the ID which is used in calculations. Furthermore, we accomplish secure connections between OoC UEs and the core network, with many security objectives such as data origin authentication, entity authentication and other security goals.}, year = {2017} }
TY - JOUR T1 - Secure Device to Device Communications for Next-Generation Networks Using Software-Defined Network AU - Firas Masoud AU - Mohammad Alchaita AU - Mohammad Assora Y1 - 2017/05/26 PY - 2017 N1 - https://doi.org/10.11648/j.ajece.20170101.16 DO - 10.11648/j.ajece.20170101.16 T2 - American Journal of Electrical and Computer Engineering JF - American Journal of Electrical and Computer Engineering JO - American Journal of Electrical and Computer Engineering SP - 40 EP - 49 PB - Science Publishing Group SN - 2640-0502 UR - https://doi.org/10.11648/j.ajece.20170101.16 AB - Mobile network security needs more attention to meet new emerging situations and applications that use modern technologies such as Device to Device (D2D) communications. One of these situations is getting the connection back securely between out of coverage (OoC) stations and the core network. This paper proposes a framework to reestablish this connection by using some of in-coverage stations, which are located at the edge of the injured area. The framework uses Software-defined Network (SDN) architecture. The local controllers (LCs), within SDN, plan the communications by selecting cluster heads (CHs) inside the injured area to begin D2D communications between these stations and the CHs, under the authority of the core network. In our framework, an effect of Free Riding Attack (FRA) can be mitigated. In addition, the privacy of user entity (UE) is achieved by decoupling the transmitted ID and the ID which is used in calculations. Furthermore, we accomplish secure connections between OoC UEs and the core network, with many security objectives such as data origin authentication, entity authentication and other security goals. VL - 1 IS - 1 ER -