Securing D2D Wireless Links by Continuous Authenticity with Legitimacy Patterns

Abstract

Device-to-Device (D2D) communications enables the efficient use of wireless system resources (i.e., power and spectrum) and promotes users' privacy but may increase the likelihood of cyber-attacks due to the lack of security infrastructure. This paper utilizes continuous authenticity to develop a security-scoring measure that can evaluate and help improve the security of current D2D wireless systems, and improve the design of 5G future systems, such as LTE-Direct. Simulation results are presented to show the feasibility of implementing the proposed security-scoring using legitimacy patterns, and to compare security-scoring results from static and random allocation of legitimacy patterns. Future legitimacy patterns could account for both technical considerations and human behavior to achieve higher performance.

Topics

11 Figures and Tables

Download Full PDF Version (Non-Commercial Use)