Validating information security framework for offloading from LTE onto D2D links

D2D communications is one of the key technologies to enable aggressive spatial frequency reuse in future evolution of cellular systems. While the standardization efforts are far from their final stage there is clear understanding that security is one of the major concerns for proximity services. Thi...

Full description

Bibliographic Details
Main Authors: Antonino Orsino, Aleksandr Ometov
Format: Article
Language:English
Published: FRUCT 2016-04-01
Series:Proceedings of the XXth Conference of Open Innovations Association FRUCT
Subjects:
D2D
Online Access:https://fruct.org/publications/fruct18/files/Ors.pdf
id doaj-d8c3afdbc31a4971b87ad28ef54d844b
record_format Article
spelling doaj-d8c3afdbc31a4971b87ad28ef54d844b2020-11-24T21:39:06ZengFRUCTProceedings of the XXth Conference of Open Innovations Association FRUCT2305-72542343-07372016-04-016641824124710.1109/FRUCT-ISPIT.2016.7561534Validating information security framework for offloading from LTE onto D2D linksAntonino Orsino0Aleksandr Ometov1ARTS Lab., DIIES Dept., University Mediterranea of Reggio Calabria, Reggio Calabria, ItalyTampere University of Technology, Tampere, FinlandD2D communications is one of the key technologies to enable aggressive spatial frequency reuse in future evolution of cellular systems. While the standardization efforts are far from their final stage there is clear understanding that security is one of the major concerns for proximity services. This is especially the case when one or more communicating stations in a logical cluster do not have an active connection to the serving base station. In this paper we propose a solution for secure throughput optimized communications in D2D-assisted cellular system. In order to provide additional throughput, a game-theoretic optimization approach is considered by taking into account social relationships and devices proximity. The proposed solution is agnostic to the chosen D2D communications technology (i.e., WiFi or LTE) and suitable for any possible cluster combination in full and partial cellular coverage. Performance evaluation of the proposed security framework show that social proximity information available at the D2D devices may substantially improves the system performance in term of throughput with respect to the standard security procedures. Finally, for sake of completeness, the effect of mobility for the reference scenario is evaluated.https://fruct.org/publications/fruct18/files/Ors.pdf ProtocolD2DClusteringPerformance evaluationInformation security
collection DOAJ
language English
format Article
sources DOAJ
author Antonino Orsino
Aleksandr Ometov
spellingShingle Antonino Orsino
Aleksandr Ometov
Validating information security framework for offloading from LTE onto D2D links
Proceedings of the XXth Conference of Open Innovations Association FRUCT
Protocol
D2D
Clustering
Performance evaluation
Information security
author_facet Antonino Orsino
Aleksandr Ometov
author_sort Antonino Orsino
title Validating information security framework for offloading from LTE onto D2D links
title_short Validating information security framework for offloading from LTE onto D2D links
title_full Validating information security framework for offloading from LTE onto D2D links
title_fullStr Validating information security framework for offloading from LTE onto D2D links
title_full_unstemmed Validating information security framework for offloading from LTE onto D2D links
title_sort validating information security framework for offloading from lte onto d2d links
publisher FRUCT
series Proceedings of the XXth Conference of Open Innovations Association FRUCT
issn 2305-7254
2343-0737
publishDate 2016-04-01
description D2D communications is one of the key technologies to enable aggressive spatial frequency reuse in future evolution of cellular systems. While the standardization efforts are far from their final stage there is clear understanding that security is one of the major concerns for proximity services. This is especially the case when one or more communicating stations in a logical cluster do not have an active connection to the serving base station. In this paper we propose a solution for secure throughput optimized communications in D2D-assisted cellular system. In order to provide additional throughput, a game-theoretic optimization approach is considered by taking into account social relationships and devices proximity. The proposed solution is agnostic to the chosen D2D communications technology (i.e., WiFi or LTE) and suitable for any possible cluster combination in full and partial cellular coverage. Performance evaluation of the proposed security framework show that social proximity information available at the D2D devices may substantially improves the system performance in term of throughput with respect to the standard security procedures. Finally, for sake of completeness, the effect of mobility for the reference scenario is evaluated.
topic Protocol
D2D
Clustering
Performance evaluation
Information security
url https://fruct.org/publications/fruct18/files/Ors.pdf
work_keys_str_mv AT antoninoorsino validatinginformationsecurityframeworkforoffloadingfromlteontod2dlinks
AT aleksandrometov validatinginformationsecurityframeworkforoffloadingfromlteontod2dlinks
_version_ 1725932657115660288