| Peer-Reviewed

Secure Device to Device Communications for Next-Generation Networks Using Software-Defined Network

Received: 11 March 2017     Accepted: 14 April 2017     Published: 26 May 2017
Views:       Downloads:
Abstract

Mobile network security needs more attention to meet new emerging situations and applications that use modern technologies such as Device to Device (D2D) communications. One of these situations is getting the connection back securely between out of coverage (OoC) stations and the core network. This paper proposes a framework to reestablish this connection by using some of in-coverage stations, which are located at the edge of the injured area. The framework uses Software-defined Network (SDN) architecture. The local controllers (LCs), within SDN, plan the communications by selecting cluster heads (CHs) inside the injured area to begin D2D communications between these stations and the CHs, under the authority of the core network. In our framework, an effect of Free Riding Attack (FRA) can be mitigated. In addition, the privacy of user entity (UE) is achieved by decoupling the transmitted ID and the ID which is used in calculations. Furthermore, we accomplish secure connections between OoC UEs and the core network, with many security objectives such as data origin authentication, entity authentication and other security goals.

Published in American Journal of Electrical and Computer Engineering (Volume 1, Issue 1)
DOI 10.11648/j.ajece.20170101.16
Page(s) 40-49
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2017. Published by Science Publishing Group

Keywords

D2D Communication, Free Riding Attack, MIKKY-SAKKE Algorithm, Radio Bearer

References
[1] Beyond LTE: Enabling the Mobile Broadband Explosion, Rysavy Research/4G Americas, August 2015.
[2] RFC 6509; MIKEY-SAKKE: Sakai-Kasahara Key Encryption in Multimedia Internet KEYing (MIKEY).
[3] 3GPP TR 33.833 V1.7.0 (2016-02); 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on Security issues to support Proximity Services (ProSe) (Release 13).
[4] RFC 6507; Elliptic Curve-Based Certificateless Signaturesfor Identity-Based Encryption (ECCSI).
[5] M. Wang and Z. Yan, “Security in D2D Communications: A Review”, IEEE computer society, 2015.
[6] RFC 6508; Sakai-Kasahara Key Encryption (SAKKE).
[7] SeDS: Secure Data Sharing Strategy for D2D Communication in LTE-Advanced Networks; Aiqing Zhang, Student Member, IEEE, Jianxin Chen, Member, IEEE, Rose Qingyang Hu, Senior Member, IEEE, and Yi Qian, Senior Member, IEEE.
[8] Secure Key Establishment for Device-to-Device Communications Wenlong Shen, Weisheng Hong, Xianghui Cao, Bo Yin, Devu Manikantan Shilaand Yu Cheng; 2014.
[9] Connectivity and Security in a D2D Communication Protocol for Public Safety Applications; Leonardo Goratti, Gary Steri, Karina M. Gomez and Gianmarco Baldini; CREATE-NET Research Centre, Trento, Italy; 2014.
[10] SYNERGY; A Game-Theoretical Approach for Cooperative Key Generation in Wireless Networks Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan; 2014.
[11] KEEP: Fast Secret Key Extraction Protocol for D2D Communication Wei Xi, Xiang-Yang Li, Chen Qian, Jinsong Han, Shaojie Tang, Jizhong Zhao, Kun Zhao; 2014.
[12] Secure Message Delivery Games for Device-to-Device Communications; Emmanouil Panaousis, Tansu Alpcan, Hossein Fereidooni, and Mauro Conti; 2014.
[13] Descendant of LEACH Based Routing Protocols in Wireless Sensor Networks; Rajendra Prasad Mahapatra, Rakesh Kumar Yadav; 2015.
[14] 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Stage 3 (Release 8); 2009.
Cite This Article
  • APA Style

    Firas Masoud, Mohammad Alchaita, Mohammad Assora. (2017). Secure Device to Device Communications for Next-Generation Networks Using Software-Defined Network. American Journal of Electrical and Computer Engineering, 1(1), 40-49. https://doi.org/10.11648/j.ajece.20170101.16

    Copy | Download

    ACS Style

    Firas Masoud; Mohammad Alchaita; Mohammad Assora. Secure Device to Device Communications for Next-Generation Networks Using Software-Defined Network. Am. J. Electr. Comput. Eng. 2017, 1(1), 40-49. doi: 10.11648/j.ajece.20170101.16

    Copy | Download

    AMA Style

    Firas Masoud, Mohammad Alchaita, Mohammad Assora. Secure Device to Device Communications for Next-Generation Networks Using Software-Defined Network. Am J Electr Comput Eng. 2017;1(1):40-49. doi: 10.11648/j.ajece.20170101.16

    Copy | Download

  • @article{10.11648/j.ajece.20170101.16,
      author = {Firas Masoud and Mohammad Alchaita and Mohammad Assora},
      title = {Secure Device to Device Communications for Next-Generation Networks Using Software-Defined Network},
      journal = {American Journal of Electrical and Computer Engineering},
      volume = {1},
      number = {1},
      pages = {40-49},
      doi = {10.11648/j.ajece.20170101.16},
      url = {https://doi.org/10.11648/j.ajece.20170101.16},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajece.20170101.16},
      abstract = {Mobile network security needs more attention to meet new emerging situations and applications that use modern technologies such as Device to Device (D2D) communications. One of these situations is getting the connection back securely between out of coverage (OoC) stations and the core network. This paper proposes a framework to reestablish this connection by using some of in-coverage stations, which are located at the edge of the injured area. The framework uses Software-defined Network (SDN) architecture. The local controllers (LCs), within SDN, plan the communications by selecting cluster heads (CHs) inside the injured area to begin D2D communications between these stations and the CHs, under the authority of the core network. In our framework, an effect of Free Riding Attack (FRA) can be mitigated. In addition, the privacy of user entity (UE) is achieved by decoupling the transmitted ID and the ID which is used in calculations. Furthermore, we accomplish secure connections between OoC UEs and the core network, with many security objectives such as data origin authentication, entity authentication and other security goals.},
     year = {2017}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Secure Device to Device Communications for Next-Generation Networks Using Software-Defined Network
    AU  - Firas Masoud
    AU  - Mohammad Alchaita
    AU  - Mohammad Assora
    Y1  - 2017/05/26
    PY  - 2017
    N1  - https://doi.org/10.11648/j.ajece.20170101.16
    DO  - 10.11648/j.ajece.20170101.16
    T2  - American Journal of Electrical and Computer Engineering
    JF  - American Journal of Electrical and Computer Engineering
    JO  - American Journal of Electrical and Computer Engineering
    SP  - 40
    EP  - 49
    PB  - Science Publishing Group
    SN  - 2640-0502
    UR  - https://doi.org/10.11648/j.ajece.20170101.16
    AB  - Mobile network security needs more attention to meet new emerging situations and applications that use modern technologies such as Device to Device (D2D) communications. One of these situations is getting the connection back securely between out of coverage (OoC) stations and the core network. This paper proposes a framework to reestablish this connection by using some of in-coverage stations, which are located at the edge of the injured area. The framework uses Software-defined Network (SDN) architecture. The local controllers (LCs), within SDN, plan the communications by selecting cluster heads (CHs) inside the injured area to begin D2D communications between these stations and the CHs, under the authority of the core network. In our framework, an effect of Free Riding Attack (FRA) can be mitigated. In addition, the privacy of user entity (UE) is achieved by decoupling the transmitted ID and the ID which is used in calculations. Furthermore, we accomplish secure connections between OoC UEs and the core network, with many security objectives such as data origin authentication, entity authentication and other security goals.
    VL  - 1
    IS  - 1
    ER  - 

    Copy | Download

Author Information
  • Computer Science Department, Syria Higher Institutes for Applied Sciences and Technology, Damascus, Syria

  • Computer Science Department, Syria Higher Institutes for Applied Sciences and Technology, Damascus, Syria

  • Computer Science Department, Syria Higher Institutes for Applied Sciences and Technology, Damascus, Syria

  • Sections