Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular Connectivity

Aleksandr Ometov, Konstantin Zhidanov, Sergey Bezzateev, Roman Florea, Sergey Andreev, Yevgeni Koucheryavy

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    21 Citations (Scopus)
    4 Downloads (Pure)

    Abstract

    Network-assisted device-to-device (D2D) communication is a next-generation wireless technology enabling direct connectivity between proximate user devices under the control of cellular infrastructure. It couples together the centralized and the distributed network architectures, and as such requires respective enablers for secure, private, and trusted data exchange especially when cellular control link is not available at all times. In this work, we conduct the state-of-the-art overview and propose a novel algorithm to maintain security functions of proximate devices in case of unreliable cellular connectivity, whether a new device joins the secure group of users or an existing device leaves it. Our proposed solution and its rigorous mathematical implementation detailed in this work open door to a novel generation of secure proximity-based services and applications in future wireless communication systems.
    Original languageEnglish
    Title of host publication2015 IEEE Trustcom/BigDataSE/ISPA
    PublisherIEEE
    Pages826-833
    Number of pages8
    Volume1
    ISBN (Print)978-1-4673-7952-6
    DOIs
    Publication statusPublished - 20 Aug 2015
    Publication typeA4 Article in conference proceedings
    EventIEEE International Conference on Trust, Security and Privacy in Computing and Communications -
    Duration: 1 Jan 1900 → …

    Conference

    ConferenceIEEE International Conference on Trust, Security and Privacy in Computing and Communications
    Period1/01/00 → …

    Publication forum classification

    • Publication forum level 1

    Fingerprint

    Dive into the research topics of 'Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular Connectivity'. Together they form a unique fingerprint.

    Cite this