2019
DOI: 10.3390/sym11080969
|View full text |Cite
|
Sign up to set email alerts
|

Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis

Abstract: Nowadays, with rapid advancement of both the upcoming 5G architecture construction and emerging Internet of Things (IoT) scenarios, Device-to-Device (D2D) communication provides a novel paradigm for mobile networking. By facilitating continuous and high data rate services between physically proximate devices without interconnection with access points (AP) or service network (SN), spectral efficiency of the 5G network can be drastically increased. However, due to its inherent open wireless communicating feature… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 21 publications
(15 citation statements)
references
References 31 publications
(61 reference statements)
0
14
0
Order By: Relevance
“…In their proposed scheme, users obtain digital signatures to prove successful data sharing and, in the sharing process, the symmetric encryption algorithm and MAC are used. Haowen Tan et al [15] proposed a D2D authenticating mechanism employing smartphone sensor behaviour analysis. Their authentication scheme is designed based on certificateless cryptography for group authentication and user's behavior analysis extracted from smartphone sensors is employed for continuous authentication.…”
Section: Existing Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…In their proposed scheme, users obtain digital signatures to prove successful data sharing and, in the sharing process, the symmetric encryption algorithm and MAC are used. Haowen Tan et al [15] proposed a D2D authenticating mechanism employing smartphone sensor behaviour analysis. Their authentication scheme is designed based on certificateless cryptography for group authentication and user's behavior analysis extracted from smartphone sensors is employed for continuous authentication.…”
Section: Existing Researchmentioning
confidence: 99%
“…Mingsheng Cao et al [11] Adeel Abro et al [12] Yasir Javed et al [13] Atefeh Mohseni-Ejiyeh et al [14] Haowen Tan et al [15] Sheeba Backia Mary Baskaran et al [16] Yunqing Sun et al [17] 3. Secure D2D Communication…”
Section: Anon Dd Ls Dtmentioning
confidence: 99%
“…The commonly shared group membership records can be dynamically managed and stored by all the legitimate vehicles. Note that the historical group communicating records can be validated and traced, which is helpful for conditional privacy preserving [13], [36]. Moreover, effective key updating mechanism involving the currently legitimate vehicles is achievable [37], [38].…”
Section: Introductionmentioning
confidence: 99%
“…In the case of natural disaster, total connectivity is removed for the survivors due to damage to the base station's infrastructure; hence, it is impractical for the cellular base station to be constructed during a short time frame. In these situations, Device-to-Device (D2D) communications technology offered the best solution to increase signal proximity [10,11]. As the name implies, in D2D communications technology, numerous devices are connected with each other to create an ad-hoc wireless network.…”
Section: Introductionmentioning
confidence: 99%