Validating information security framework for offloading from LTE onto D2D links
D2D communications is one of the key technologies to enable aggressive spatial frequency reuse in future evolution of cellular systems. While the standardization efforts are far from their final stage there is clear understanding that security is one of the major concerns for proximity services. Thi...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
FRUCT
2016-04-01
|
Series: | Proceedings of the XXth Conference of Open Innovations Association FRUCT |
Subjects: | |
Online Access: | https://fruct.org/publications/fruct18/files/Ors.pdf
|
id |
doaj-d8c3afdbc31a4971b87ad28ef54d844b |
---|---|
record_format |
Article |
spelling |
doaj-d8c3afdbc31a4971b87ad28ef54d844b2020-11-24T21:39:06ZengFRUCTProceedings of the XXth Conference of Open Innovations Association FRUCT2305-72542343-07372016-04-016641824124710.1109/FRUCT-ISPIT.2016.7561534Validating information security framework for offloading from LTE onto D2D linksAntonino Orsino0Aleksandr Ometov1ARTS Lab., DIIES Dept., University Mediterranea of Reggio Calabria, Reggio Calabria, ItalyTampere University of Technology, Tampere, FinlandD2D communications is one of the key technologies to enable aggressive spatial frequency reuse in future evolution of cellular systems. While the standardization efforts are far from their final stage there is clear understanding that security is one of the major concerns for proximity services. This is especially the case when one or more communicating stations in a logical cluster do not have an active connection to the serving base station. In this paper we propose a solution for secure throughput optimized communications in D2D-assisted cellular system. In order to provide additional throughput, a game-theoretic optimization approach is considered by taking into account social relationships and devices proximity. The proposed solution is agnostic to the chosen D2D communications technology (i.e., WiFi or LTE) and suitable for any possible cluster combination in full and partial cellular coverage. Performance evaluation of the proposed security framework show that social proximity information available at the D2D devices may substantially improves the system performance in term of throughput with respect to the standard security procedures. Finally, for sake of completeness, the effect of mobility for the reference scenario is evaluated.https://fruct.org/publications/fruct18/files/Ors.pdf ProtocolD2DClusteringPerformance evaluationInformation security |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Antonino Orsino Aleksandr Ometov |
spellingShingle |
Antonino Orsino Aleksandr Ometov Validating information security framework for offloading from LTE onto D2D links Proceedings of the XXth Conference of Open Innovations Association FRUCT Protocol D2D Clustering Performance evaluation Information security |
author_facet |
Antonino Orsino Aleksandr Ometov |
author_sort |
Antonino Orsino |
title |
Validating information security framework for offloading from LTE onto D2D links |
title_short |
Validating information security framework for offloading from LTE onto D2D links |
title_full |
Validating information security framework for offloading from LTE onto D2D links |
title_fullStr |
Validating information security framework for offloading from LTE onto D2D links |
title_full_unstemmed |
Validating information security framework for offloading from LTE onto D2D links |
title_sort |
validating information security framework for offloading from lte onto d2d links |
publisher |
FRUCT |
series |
Proceedings of the XXth Conference of Open Innovations Association FRUCT |
issn |
2305-7254 2343-0737 |
publishDate |
2016-04-01 |
description |
D2D communications is one of the key technologies to enable aggressive spatial frequency reuse in future evolution of cellular systems. While the standardization efforts are far from their final stage there is clear understanding that security is one of the major concerns for proximity services. This is especially the case when one or more communicating stations in a logical cluster do not have an active connection to the serving base station. In this paper we propose a solution for secure throughput optimized communications in D2D-assisted cellular system. In order to provide additional throughput, a game-theoretic optimization approach is considered by taking into account social relationships and devices proximity. The proposed solution is agnostic to the chosen D2D communications technology (i.e., WiFi or LTE) and suitable for any possible cluster combination in full and partial cellular coverage. Performance evaluation of the proposed security framework show that social proximity information available at the D2D devices may substantially improves the system performance in term of throughput with respect to the standard security procedures. Finally, for sake of completeness, the effect of mobility for the reference scenario is evaluated. |
topic |
Protocol D2D Clustering Performance evaluation Information security |
url |
https://fruct.org/publications/fruct18/files/Ors.pdf
|
work_keys_str_mv |
AT antoninoorsino validatinginformationsecurityframeworkforoffloadingfromlteontod2dlinks AT aleksandrometov validatinginformationsecurityframeworkforoffloadingfromlteontod2dlinks |
_version_ |
1725932657115660288 |