2019
DOI: 10.1109/access.2019.2904909
|View full text |Cite
|
Sign up to set email alerts
|

SDR Implementation of a D2D Security Cryptographic Mechanism

Abstract: Device-to-device (D2D) communication represents a promising technique to enable devices to communicate directly without the interaction of access points or base stations. The ad hoc and proximity nature of this communication introduce some very important security vulnerabilities. Key management, access control, privacy, secure routing, and transmission need dedicated signaling procedures and optimized implementation mechanisms that are appropriate for the mobile, low-energy, and low-processing power environmen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 16 publications
0
12
0
Order By: Relevance
“…Moreover, a user of healthy eNodeB may fall in the DOS attack by receiving too many requests from a malicious user. T. Ballan et al [9] use a Physically Unclonable Functions (PUF) to generate the secret key for each device. This circuit generates a unique value based on the unique character of each D2D devices, then use this unique value with the public key of another device and Elliptic Curve Cryptography to generate a shared secret key.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, a user of healthy eNodeB may fall in the DOS attack by receiving too many requests from a malicious user. T. Ballan et al [9] use a Physically Unclonable Functions (PUF) to generate the secret key for each device. This circuit generates a unique value based on the unique character of each D2D devices, then use this unique value with the public key of another device and Elliptic Curve Cryptography to generate a shared secret key.…”
Section: Related Workmentioning
confidence: 99%
“…To preserve confidentiality property, both Source and Destination have to use a key that sets before communication. We suppose each device already exchanged the key in a way such as key agreement procedures in [9], [10]. In the disaster situation, we suppose losing confidentiality is less important than losing vital communication.…”
Section: Direct D2d Secure Protocol Without Cellular Infrastructure (Dd2dw)mentioning
confidence: 99%
“…Smartphones with SDR capabilities are considered in [28] to overcome the IoT language barriers, while a low-power basedband processor is designed in [29] to effectively support SDR usage in IoT applications. The security aspects of device-to-device communications are considered in [30], where a SDR platform is used to implement a cryptographic mechanism. Another work related to IoT security is [31], where SDR is used to assess the vulnerability in IoT devices to RF jamming attacks and to implement appropriate mitigation strategies.…”
Section: Sdr For Iotmentioning
confidence: 99%
“…In studies like [27][28][29][30], they proposed schemes that added encryption and digital signatures in the routing process to secure dissemination of control and data packets. However, cryptographic operations are still considered as expensive on resource-constrained devices [31]; although, other works, such as [32,33], addressed issues of key generation, key distribution, and key management. Other works, such as [34], tried to address the issue of encryption complexity regarding the time taken for encryption and decryption.…”
Section: Cryptography Systemsmentioning
confidence: 99%