메뉴 건너뛰기




Volumn 22, Issue 2, 2017, Pages 195-208

A Survey on Security in D2D Communications

Author keywords

5G; Device to Device (D2D) communicaitons; LTE advanced network; Privacy; Security

Indexed keywords

4G MOBILE COMMUNICATION SYSTEMS; DATA PRIVACY; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK ARCHITECTURE; NEXT GENERATION NETWORKS; STANDARDS; SURVEYS; TELECOMMUNICATION NETWORKS; TELECOMMUNICATION SERVICES; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84969980315     PISSN: 1383469X     EISSN: 15728153     Source Type: Journal    
DOI: 10.1007/s11036-016-0741-5     Document Type: Article
Times cited : (105)

References (63)
  • 1
    • 85033670560 scopus 로고    scopus 로고
    • Specification of the Bluetooth system, Bluetooth Core Specification
    • Bluetooth, S.I.G, Specification of the Bluetooth system, Bluetooth Core Specification, Version 4.2, 2014
    • (2014) Version , vol.4 , pp. 2
    • Bluetooth, S.I.G.1
  • 2
    • 84901437451 scopus 로고    scopus 로고
    • A survey on Device-to-Device communication in cellular networks
    • Asadi A, Wang Q, Mancuso V (2014) A survey on Device-to-Device communication in cellular networks. IEEE Commun Surv Tutorials 16(4):1801–1819
    • (2014) IEEE Commun Surv Tutorials , vol.16 , Issue.4 , pp. 1801-1819
    • Asadi, A.1    Wang, Q.2    Mancuso, V.3
  • 7
    • 72949120015 scopus 로고    scopus 로고
    • Device-to-Device communication as an underlay to LTE-advanced networks
    • Doppler K, Rinne M, Wijting C, Ribeiro C, Hugl K (2009) Device-to-Device communication as an underlay to LTE-advanced networks. IEEE Commun Mag 47(12):42–49
    • (2009) IEEE Commun Mag , vol.47 , Issue.12 , pp. 42-49
    • Doppler, K.1    Rinne, M.2    Wijting, C.3    Ribeiro, C.4    Hugl, K.5
  • 8
    • 84863772559 scopus 로고    scopus 로고
    • Operator controlled Device-to-Device communications in LTE-advanced networks
    • Lei L, Zhong Z, Lin C, Shen X (2012) Operator controlled Device-to-Device communications in LTE-advanced networks. IEEE Wirel Commun 19(3):96–104
    • (2012) IEEE Wirel Commun , vol.19 , Issue.3 , pp. 96-104
    • Lei, L.1    Zhong, Z.2    Lin, C.3    Shen, X.4
  • 10
    • 84920845630 scopus 로고    scopus 로고
    • Device-to-device communication underlaying converged heterogeneous networks
    • Gamage A, Liang H, Zhang R, Shen X (2014) Device-to-device communication underlaying converged heterogeneous networks. IEEE Wirel Commun 21(6):98–107
    • (2014) IEEE Wirel Commun , vol.21 , Issue.6 , pp. 98-107
    • Gamage, A.1    Liang, H.2    Zhang, R.3    Shen, X.4
  • 21
    • 84930507156 scopus 로고    scopus 로고
    • M2M communications in 3GPP LTE/LTE-A networks: architectures, service requirements, challenges, and applications
    • Second Quarter
    • Ghavimi F, Chen H (2015) M2M communications in 3GPP LTE/LTE-A networks: architectures, service requirements, challenges, and applications. IEEE Commun Surv Tutorials 17(2):525–549 Second Quarter
    • (2015) IEEE Commun Surv Tutorials , vol.17 , Issue.2 , pp. 525-549
    • Ghavimi, F.1    Chen, H.2
  • 25
    • 84966827176 scopus 로고    scopus 로고
    • SeDS: Secure data sharing strategy for D2D communication in LTE-Advanced networks
    • Zhang A, Chen J, Hu R, Qian Y (2015) SeDS: Secure data sharing strategy for D2D communication in LTE-Advanced networks. IEEE Trans Veh Technol PP(99):1
    • (2015) IEEE Trans Veh Technol , vol.PP , Issue.99 , pp. 1
    • Zhang, A.1    Chen, J.2    Hu, R.3    Qian, Y.4
  • 36
    • 84966544124 scopus 로고    scopus 로고
    • Modeling and analysis on access control for Device-to-Device communications in cellular network: a network calculus based approach
    • Huang J, Sun Y, Xiong Z, Duan Q, Zhao Y, Cao X, Wang W (2015) Modeling and analysis on access control for Device-to-Device communications in cellular network: a network calculus based approach. IEEE Trans Veh Technol PP(99):1
    • (2015) IEEE Trans Veh Technol , vol.PP , Issue.99 , pp. 1
    • Huang, J.1    Sun, Y.2    Xiong, Z.3    Duan, Q.4    Zhao, Y.5    Cao, X.6    Wang, W.7
  • 37
    • 84919326951 scopus 로고    scopus 로고
    • A priority-based access control model for Device-to-Device communications underlaying cellular network using network calculus
    • Huang J, Xiong Z, Li J, Chen Q, Duan Q, Zhao Y (2014) A priority-based access control model for Device-to-Device communications underlaying cellular network using network calculus. Wirel Algoritm Syst Appl 8491:613–623
    • (2014) Wirel Algoritm Syst Appl , vol.8491 , pp. 613-623
    • Huang, J.1    Xiong, Z.2    Li, J.3    Chen, Q.4    Duan, Q.5    Zhao, Y.6
  • 38
    • 84890430700 scopus 로고    scopus 로고
    • Secrecy-based access control for Device-to-Device communication underlaying cellular networks
    • Yue J, Ma C, Yu H, Zhou W (2013) Secrecy-based access control for Device-to-Device communication underlaying cellular networks. IEEE Commun Lett 17(11):2068–2071
    • (2013) IEEE Commun Lett , vol.17 , Issue.11 , pp. 2068-2071
    • Yue, J.1    Ma, C.2    Yu, H.3    Zhou, W.4
  • 39
    • 84907003865 scopus 로고    scopus 로고
    • Radio resource allocation for physical-layer security in D2D underlay communications
    • Zhang H, Wang T, Song L, Han Z (2014) “Radio resource allocation for physical-layer security in D2D underlay communications,” 2014 I.E. International Conference on Communications (ICC 2014), pp. 2319–2324
    • (2014) E. International Conference on Communications (ICC , pp. 2319-2324
    • Zhang, H.1    Wang, T.2    Song, L.3
  • 43
    • 84921325413 scopus 로고    scopus 로고
    • Social network aware Device-to-Device communication in wireless networks
    • Zhang Y, Pan E, Song L, Saad W, Dawy Z, Han Z (2015) Social network aware Device-to-Device communication in wireless networks. IEEE Trans Wirel Commun 14(1):177–190
    • (2015) IEEE Trans Wirel Commun , vol.14 , Issue.1 , pp. 177-190
    • Zhang, Y.1    Pan, E.2    Song, L.3    Saad, W.4    Dawy, Z.5    Han, Z.6
  • 44
    • 84948434446 scopus 로고    scopus 로고
    • Exploiting social ties for cooperative D2D communications: a mobile social networking case
    • Chen X, Proulx B, Gong X, Zhang J (2015) Exploiting social ties for cooperative D2D communications: a mobile social networking case. IEEE/ACM Trans Networking 23(5):1471–1484
    • (2015) IEEE/ACM Trans Networking , vol.23 , Issue.5 , pp. 1471-1484
    • Chen, X.1    Proulx, B.2    Gong, X.3    Zhang, J.4
  • 46
    • 84946561244 scopus 로고    scopus 로고
    • An unwanted content Control system in pervasive social networking based on trust management
    • Ma S, Yan Z (2015) An unwanted content Control system in pervasive social networking based on trust management. ACM Trans Multimed Comput Commun Appl 12(1s)
    • (2015) ACM Trans Multimed Comput Commun Appl , vol.12 , Issue.1s
    • Ma, S.1    Yan, Z.2
  • 48
    • 84875695373 scopus 로고    scopus 로고
    • A key management and secure routing integrated framework for mobile ad-hoc networks
    • Zhao S, Robert K, Akshai A (2013) A key management and secure routing integrated framework for mobile ad-hoc networks. Ad Hoc Netw 11(3):1046–1061
    • (2013) Ad Hoc Netw , vol.11 , Issue.3 , pp. 1046-1061
    • Zhao, S.1    Robert, K.2    Akshai, A.3
  • 49
    • 84918571465 scopus 로고    scopus 로고
    • Parallel key management scheme for mobile ad hoc network based on traffic mining
    • Lakshmi P, Kumar A (2015) Parallel key management scheme for mobile ad hoc network based on traffic mining. IET Inf Secur 9(1):14–23
    • (2015) IET Inf Secur , vol.9 , Issue.1 , pp. 14-23
    • Lakshmi, P.1    Kumar, A.2
  • 50
    • 33144467802 scopus 로고    scopus 로고
    • Secure data communication in mobile ad hoc networks
    • Papadimitratos P, Haas Z (2006) Secure data communication in mobile ad hoc networks. IEEE J Sel Areas Commun 24(2):343–356
    • (2006) IEEE J Sel Areas Commun , vol.24 , Issue.2 , pp. 343-356
    • Papadimitratos, P.1    Haas, Z.2
  • 51
    • 15244360279 scopus 로고    scopus 로고
    • An efficient key predistribution scheme for ad hoc network security
    • Ramkumar M, Memon N (2005) An efficient key predistribution scheme for ad hoc network security. IEEE J Sel Areas Commun 23(3):611–621
    • (2005) IEEE J Sel Areas Commun , vol.23 , Issue.3 , pp. 611-621
    • Ramkumar, M.1    Memon, N.2
  • 52
    • 0036804761 scopus 로고    scopus 로고
    • Routing security in wireless ad hoc networks
    • Deng H, Li W, Agrawal D (2002) Routing security in wireless ad hoc networks. IEEE Commun Mag 40(10):70–75
    • (2002) IEEE Commun Mag , vol.40 , Issue.10 , pp. 70-75
    • Deng, H.1    Li, W.2    Agrawal, D.3
  • 53
    • 36849079903 scopus 로고    scopus 로고
    • A survey of security issues in mobile ad hoc networks
    • Fourth Quarter
    • Djamel D, Khelladi L, Badache N (2007) A survey of security issues in mobile ad hoc networks. IEEE Wirel Commun 14(5):85–91 Fourth Quarter
    • (2007) IEEE Wirel Commun , vol.14 , Issue.5 , pp. 85-91
    • Djamel, D.1    Khelladi, L.2    Badache, N.3
  • 54
    • 70450164574 scopus 로고    scopus 로고
    • A survey of secure mobile ad hoc routing protocols
    • Fourth Quarter
    • Loay A, Khokhar A, Guizani M (2008) A survey of secure mobile ad hoc routing protocols. IEEE Commun Surv Tutorials 10(4):78–93 Fourth Quarter
    • (2008) IEEE Commun Surv Tutorials , vol.10 , Issue.4 , pp. 78-93
    • Loay, A.1    Khokhar, A.2    Guizani, M.3
  • 55
    • 56449121040 scopus 로고    scopus 로고
    • Improving on-demand data access efficiency in MANETs with cooperative caching
    • Yu D, Gupta S, Varsamopoulos G (2009) Improving on-demand data access efficiency in MANETs with cooperative caching. Ad Hoc Netw 7(3):579–598
    • (2009) Ad Hoc Netw , vol.7 , Issue.3 , pp. 579-598
    • Yu, D.1    Gupta, S.2    Varsamopoulos, G.3
  • 61
    • 85032751776 scopus 로고    scopus 로고
    • Enhancing physical-layer secrecy in multi-antenna wireless systems: an overview of signal processing approaches
    • Hong Y, Lan P, Kuo C (2013) Enhancing physical-layer secrecy in multi-antenna wireless systems: an overview of signal processing approaches. IEEE Signal Process Mag 30(5):29–40
    • (2013) IEEE Signal Process Mag , vol.30 , Issue.5 , pp. 29-40
    • Hong, Y.1    Lan, P.2    Kuo, C.3
  • 62
    • 84865493080 scopus 로고    scopus 로고
    • Cooperative key generation in wireless networks
    • Lai L, Liang Y, Du W (2012) Cooperative key generation in wireless networks. IEEE J Sel Areas Commun 30(8):1578–1588
    • (2012) IEEE J Sel Areas Commun , vol.30 , Issue.8 , pp. 1578-1588
    • Lai, L.1    Liang, Y.2    Du, W.3
  • 63
    • 85027051275 scopus 로고    scopus 로고
    • Protect pervasive social networking based on two-dimensional trust levels
    • Yan Z, Wang M (2014) Protect pervasive social networking based on two-dimensional trust levels. IEEE Syst J PP(99):1–12
    • (2014) IEEE Syst J , vol.PP , Issue.99 , pp. 1-12
    • Yan, Z.1    Wang, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.