دانلود رایگان مقاله چارچوب امنیتی محور برای اتصال D2D بر اساس پروکسی میتی مکانی و اجتماعی

عنوان فارسی
چارچوب امنیتی محور جدید برای اتصال D2D بر اساس پروکسی میتی مکانی و اجتماعی
عنوان انگلیسی
A novel security-centric framework for D2D connectivity based on spatial and social proximity
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
12
سال انتشار
2016
نشریه
الزویر - Elsevier
فرمت مقاله انگلیسی
PDF
کد محصول
E904
رشته های مرتبط با این مقاله
مهندسی کامپیوتر و مهندسی فناوری اطلاعات
گرایش های مرتبط با این مقاله
شبکه های کامپیوتری
مجله
شبکه های کامپیوتر - Computer Networks
دانشگاه
گروه مهندسی الکترونیک و ارتباطات، دانشگاه فناوری تامپر فنلاند
کلمات کلیدی
D2D، امنیت، نزدیکی های اجتماعی، خوشه، سنجش عملکرد
چکیده

Abstract


Device-to-device (D2D) communication is one of the most promising innovations in the next-generation wireless ecosystem, which improves the degrees of spatial reuse and creates novel social opportunities for users in proximity. As standardization behind network-assisted D2D technology takes shape, it becomes clear that security of direct connectivity is one of the key concerns on the way to its ultimate user adoption. This is especially true when a personal user cluster (that is, a smartphone and associated wearable devices) does not have a reliable connection to the cellular infrastructure. In this paper, we propose a novel framework that embraces security of geographically proximate user clusters. More specifically, we employ game-theoretic mechanisms for appropriate user clustering taking into account both spatial and social notions of proximity. Further, our information security procedures implemented on top of this clustering scheme enable continuous support for secure direct communication even in case of unreliable/unavailable cellular connectivity. Explicitly incorporating the effects of user mobility, we numerically evaluate the proposed framework by confirming that it has the potential to substantially improve the resulting system-wide performance.

نتیجه گیری

6. Concluding remarks


In this paper, we discussed a security framework for proximity services in order to provide additional coverage for users that are facing intermittent cellular connectivity. We exploited a game theoretical framework (i.e., in terms of the cluster formation), where social relationships among users and the effects of cellular transmissions are considered explicitly. In the reference scenario, we studied the case of the cellular BS providing partial coverage and helping disseminate certain content that has to be distributed among all the active users. In such a situation, the cluster formation game is utilized for the user clustering by employing either social or spatial proximity, whereas the information security procedures take advantage of the obtained group configuration to exchange the data in a protected way. The obtained results indicated that, even though the amount of signaling messages was slightly increased, the proposed security framework was able to deliver connectivity to those users that were outside the cellular network coverage, and consequently did not have a reliable connection to the cellular infrastructure. As a result, we can assert that the consideration of both network geometry and social metrics enables dissemination of information to larger numbers of users with higher throughput, but at the cost of some additional delay due to extra signaling messages exchanged locally within each cluster. In summary, we conclude that the proposed framework based on spatial and social notions of proximity significantly improves many performance metrics of interest in characteristic cellularassisted D2D scenarios, where users exchange traffic generated by their wearable devices while utilizing smartphones as data aggregators. Our modeling approach may thus become useful as a reference point for further research in this field.


بدون دیدگاه