TY - GEN
T1 - Validating information security framework for offloading from LTE onto D2D links
AU - Orsino, Antonino
AU - Ometov, Aleksandr
PY - 2016/9/6
Y1 - 2016/9/6
N2 - D2D communications is one of the key technologies to enable aggressive spatial frequency reuse in future evolution of cellular systems. While the standardization efforts are far from their final stage there is clear understanding that security is one of the major concerns for proximity services. This is especially the case when one or more communicating stations in a logical cluster do not have an active connection to the serving base station. In this paper we propose a solution for secure throughput optimized communications in D2D-assisted cellular system. In order to provide additional throughput, a game-theoretic optimization approach is considered by taking into account social relationships and devices proximity. The proposed solution is agnostic to the chosen D2D communications technology (i.e., WiFi or LTE) and suitable for any possible cluster combination in full and partial cellular coverage. Performance evaluation of the proposed security framework show that social proximity information available at the D2D devices may substantially improves the system performance in term of throughput with respect to the standard security procedures. Finally, for sake of completeness, the effect of mobility for the reference scenario is evaluated.
AB - D2D communications is one of the key technologies to enable aggressive spatial frequency reuse in future evolution of cellular systems. While the standardization efforts are far from their final stage there is clear understanding that security is one of the major concerns for proximity services. This is especially the case when one or more communicating stations in a logical cluster do not have an active connection to the serving base station. In this paper we propose a solution for secure throughput optimized communications in D2D-assisted cellular system. In order to provide additional throughput, a game-theoretic optimization approach is considered by taking into account social relationships and devices proximity. The proposed solution is agnostic to the chosen D2D communications technology (i.e., WiFi or LTE) and suitable for any possible cluster combination in full and partial cellular coverage. Performance evaluation of the proposed security framework show that social proximity information available at the D2D devices may substantially improves the system performance in term of throughput with respect to the standard security procedures. Finally, for sake of completeness, the effect of mobility for the reference scenario is evaluated.
U2 - 10.1109/FRUCT-ISPIT.2016.7561534
DO - 10.1109/FRUCT-ISPIT.2016.7561534
M3 - Conference contribution
AN - SCOPUS:84989166036
SP - 241
EP - 247
BT - Proceedings of the 18th Conference of Open Innovations Association FRUCT and Seminar on Information Security and Protection of Information Technolog, FRUCT-ISPIT 2016
T2 - Conference of the Open Innovations Association FRUCT
Y2 - 1 January 1900
ER -