Eintrag weiter verarbeiten
author_facet |
Tan, Haowen Song, Yuanzhao Xuan, Shichang Pan, Sungbum Chung, Ilyong Tan, Haowen Song, Yuanzhao Xuan, Shichang Pan, Sungbum Chung, Ilyong |
---|---|
author |
Tan, Haowen Song, Yuanzhao Xuan, Shichang Pan, Sungbum Chung, Ilyong |
spellingShingle |
Tan, Haowen Song, Yuanzhao Xuan, Shichang Pan, Sungbum Chung, Ilyong Symmetry Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis Physics and Astronomy (miscellaneous) General Mathematics Chemistry (miscellaneous) Computer Science (miscellaneous) |
author_sort |
tan, haowen |
spelling |
Tan, Haowen Song, Yuanzhao Xuan, Shichang Pan, Sungbum Chung, Ilyong 2073-8994 MDPI AG Physics and Astronomy (miscellaneous) General Mathematics Chemistry (miscellaneous) Computer Science (miscellaneous) http://dx.doi.org/10.3390/sym11080969 <jats:p>Nowadays, with rapid advancement of both the upcoming 5G architecture construction and emerging Internet of Things (IoT) scenarios, Device-to-Device (D2D) communication provides a novel paradigm for mobile networking. By facilitating continuous and high data rate services between physically proximate devices without interconnection with access points (AP) or service network (SN), spectral efficiency of the 5G network can be drastically increased. However, due to its inherent open wireless communicating features, security issues and privacy risks in D2D communication remain unsolved in spite of its benefits and prosperous future. Hence, proper D2D authentication mechanisms among the D2D entities are of great significance. Moreover, the increasing proliferation of smartphones enables seamlessly biometric sensor data collecting and processing, which highly correspond to the user’s unique behavioral characteristics. For the above consideration, we present a secure certificateless D2D authenticating mechanism intended for extreme scenarios in this paper. In the assumption, the key updating mechanism only requires a small modification in the SN side, while the decryption information of user equipment (UEs) remains constant as soon as the UEs are validated. Note that a symmetric key mechanism is adopted for the further data transmission. Additionally, the user activities data from smartphone sensors are analyzed for continuous authentication, which is periodically conducted after the initial validation. Note that in the assumed scenario, most of the UEs are out of the effective range of cellular networks. In this case, the UEs are capable of conducting data exchange without cellular connection. Security analysis demonstrates that the proposed scheme can provide adequate security properties as well as resistance to various attacks. Furthermore, performance analysis proves that the proposed scheme is efficient compared with state-of-the-art D2D authentication schemes.</jats:p> Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis Symmetry |
doi_str_mv |
10.3390/sym11080969 |
facet_avail |
Online Free |
finc_class_facet |
Physik Chemie und Pharmazie Technik Informatik |
format |
ElectronicArticle |
fullrecord |
blob:ai-49-aHR0cDovL2R4LmRvaS5vcmcvMTAuMzM5MC9zeW0xMTA4MDk2OQ |
id |
ai-49-aHR0cDovL2R4LmRvaS5vcmcvMTAuMzM5MC9zeW0xMTA4MDk2OQ |
institution |
DE-D275 DE-Bn3 DE-Brt1 DE-Zwi2 DE-D161 DE-Gla1 DE-Zi4 DE-15 DE-Rs1 DE-Pl11 DE-105 DE-14 DE-Ch1 DE-L229 |
imprint |
MDPI AG, 2019 |
imprint_str_mv |
MDPI AG, 2019 |
issn |
2073-8994 |
issn_str_mv |
2073-8994 |
language |
English |
mega_collection |
MDPI AG (CrossRef) |
match_str |
tan2019secured2dgroupauthenticationemployingsmartphonesensorbehavioranalysis |
publishDateSort |
2019 |
publisher |
MDPI AG |
recordtype |
ai |
record_format |
ai |
series |
Symmetry |
source_id |
49 |
title |
Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis |
title_unstemmed |
Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis |
title_full |
Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis |
title_fullStr |
Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis |
title_full_unstemmed |
Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis |
title_short |
Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis |
title_sort |
secure d2d group authentication employing smartphone sensor behavior analysis |
topic |
Physics and Astronomy (miscellaneous) General Mathematics Chemistry (miscellaneous) Computer Science (miscellaneous) |
url |
http://dx.doi.org/10.3390/sym11080969 |
publishDate |
2019 |
physical |
969 |
description |
<jats:p>Nowadays, with rapid advancement of both the upcoming 5G architecture construction and emerging Internet of Things (IoT) scenarios, Device-to-Device (D2D) communication provides a novel paradigm for mobile networking. By facilitating continuous and high data rate services between physically proximate devices without interconnection with access points (AP) or service network (SN), spectral efficiency of the 5G network can be drastically increased. However, due to its inherent open wireless communicating features, security issues and privacy risks in D2D communication remain unsolved in spite of its benefits and prosperous future. Hence, proper D2D authentication mechanisms among the D2D entities are of great significance. Moreover, the increasing proliferation of smartphones enables seamlessly biometric sensor data collecting and processing, which highly correspond to the user’s unique behavioral characteristics. For the above consideration, we present a secure certificateless D2D authenticating mechanism intended for extreme scenarios in this paper. In the assumption, the key updating mechanism only requires a small modification in the SN side, while the decryption information of user equipment (UEs) remains constant as soon as the UEs are validated. Note that a symmetric key mechanism is adopted for the further data transmission. Additionally, the user activities data from smartphone sensors are analyzed for continuous authentication, which is periodically conducted after the initial validation. Note that in the assumed scenario, most of the UEs are out of the effective range of cellular networks. In this case, the UEs are capable of conducting data exchange without cellular connection. Security analysis demonstrates that the proposed scheme can provide adequate security properties as well as resistance to various attacks. Furthermore, performance analysis proves that the proposed scheme is efficient compared with state-of-the-art D2D authentication schemes.</jats:p> |
container_issue |
8 |
container_start_page |
0 |
container_title |
Symmetry |
container_volume |
11 |
format_de105 |
Article, E-Article |
format_de14 |
Article, E-Article |
format_de15 |
Article, E-Article |
format_de520 |
Article, E-Article |
format_de540 |
Article, E-Article |
format_dech1 |
Article, E-Article |
format_ded117 |
Article, E-Article |
format_degla1 |
E-Article |
format_del152 |
Buch |
format_del189 |
Article, E-Article |
format_dezi4 |
Article |
format_dezwi2 |
Article, E-Article |
format_finc |
Article, E-Article |
format_nrw |
Article, E-Article |
_version_ |
1792332137595142147 |
geogr_code |
not assigned |
last_indexed |
2024-03-01T13:52:05.821Z |
geogr_code_person |
not assigned |
openURL |
url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fvufind.svn.sourceforge.net%3Agenerator&rft.title=Secure+D2D+Group+Authentication+Employing+Smartphone+Sensor+Behavior+Analysis&rft.date=2019-08-01&genre=article&issn=2073-8994&volume=11&issue=8&pages=969&jtitle=Symmetry&atitle=Secure+D2D+Group+Authentication+Employing+Smartphone+Sensor+Behavior+Analysis&aulast=Chung&aufirst=Ilyong&rft_id=info%3Adoi%2F10.3390%2Fsym11080969&rft.language%5B0%5D=eng |
SOLR | |
_version_ | 1792332137595142147 |
author | Tan, Haowen, Song, Yuanzhao, Xuan, Shichang, Pan, Sungbum, Chung, Ilyong |
author_facet | Tan, Haowen, Song, Yuanzhao, Xuan, Shichang, Pan, Sungbum, Chung, Ilyong, Tan, Haowen, Song, Yuanzhao, Xuan, Shichang, Pan, Sungbum, Chung, Ilyong |
author_sort | tan, haowen |
container_issue | 8 |
container_start_page | 0 |
container_title | Symmetry |
container_volume | 11 |
description | <jats:p>Nowadays, with rapid advancement of both the upcoming 5G architecture construction and emerging Internet of Things (IoT) scenarios, Device-to-Device (D2D) communication provides a novel paradigm for mobile networking. By facilitating continuous and high data rate services between physically proximate devices without interconnection with access points (AP) or service network (SN), spectral efficiency of the 5G network can be drastically increased. However, due to its inherent open wireless communicating features, security issues and privacy risks in D2D communication remain unsolved in spite of its benefits and prosperous future. Hence, proper D2D authentication mechanisms among the D2D entities are of great significance. Moreover, the increasing proliferation of smartphones enables seamlessly biometric sensor data collecting and processing, which highly correspond to the user’s unique behavioral characteristics. For the above consideration, we present a secure certificateless D2D authenticating mechanism intended for extreme scenarios in this paper. In the assumption, the key updating mechanism only requires a small modification in the SN side, while the decryption information of user equipment (UEs) remains constant as soon as the UEs are validated. Note that a symmetric key mechanism is adopted for the further data transmission. Additionally, the user activities data from smartphone sensors are analyzed for continuous authentication, which is periodically conducted after the initial validation. Note that in the assumed scenario, most of the UEs are out of the effective range of cellular networks. In this case, the UEs are capable of conducting data exchange without cellular connection. Security analysis demonstrates that the proposed scheme can provide adequate security properties as well as resistance to various attacks. Furthermore, performance analysis proves that the proposed scheme is efficient compared with state-of-the-art D2D authentication schemes.</jats:p> |
doi_str_mv | 10.3390/sym11080969 |
facet_avail | Online, Free |
finc_class_facet | Physik, Chemie und Pharmazie, Technik, Informatik |
format | ElectronicArticle |
format_de105 | Article, E-Article |
format_de14 | Article, E-Article |
format_de15 | Article, E-Article |
format_de520 | Article, E-Article |
format_de540 | Article, E-Article |
format_dech1 | Article, E-Article |
format_ded117 | Article, E-Article |
format_degla1 | E-Article |
format_del152 | Buch |
format_del189 | Article, E-Article |
format_dezi4 | Article |
format_dezwi2 | Article, E-Article |
format_finc | Article, E-Article |
format_nrw | Article, E-Article |
geogr_code | not assigned |
geogr_code_person | not assigned |
id | ai-49-aHR0cDovL2R4LmRvaS5vcmcvMTAuMzM5MC9zeW0xMTA4MDk2OQ |
imprint | MDPI AG, 2019 |
imprint_str_mv | MDPI AG, 2019 |
institution | DE-D275, DE-Bn3, DE-Brt1, DE-Zwi2, DE-D161, DE-Gla1, DE-Zi4, DE-15, DE-Rs1, DE-Pl11, DE-105, DE-14, DE-Ch1, DE-L229 |
issn | 2073-8994 |
issn_str_mv | 2073-8994 |
language | English |
last_indexed | 2024-03-01T13:52:05.821Z |
match_str | tan2019secured2dgroupauthenticationemployingsmartphonesensorbehavioranalysis |
mega_collection | MDPI AG (CrossRef) |
physical | 969 |
publishDate | 2019 |
publishDateSort | 2019 |
publisher | MDPI AG |
record_format | ai |
recordtype | ai |
series | Symmetry |
source_id | 49 |
spelling | Tan, Haowen Song, Yuanzhao Xuan, Shichang Pan, Sungbum Chung, Ilyong 2073-8994 MDPI AG Physics and Astronomy (miscellaneous) General Mathematics Chemistry (miscellaneous) Computer Science (miscellaneous) http://dx.doi.org/10.3390/sym11080969 <jats:p>Nowadays, with rapid advancement of both the upcoming 5G architecture construction and emerging Internet of Things (IoT) scenarios, Device-to-Device (D2D) communication provides a novel paradigm for mobile networking. By facilitating continuous and high data rate services between physically proximate devices without interconnection with access points (AP) or service network (SN), spectral efficiency of the 5G network can be drastically increased. However, due to its inherent open wireless communicating features, security issues and privacy risks in D2D communication remain unsolved in spite of its benefits and prosperous future. Hence, proper D2D authentication mechanisms among the D2D entities are of great significance. Moreover, the increasing proliferation of smartphones enables seamlessly biometric sensor data collecting and processing, which highly correspond to the user’s unique behavioral characteristics. For the above consideration, we present a secure certificateless D2D authenticating mechanism intended for extreme scenarios in this paper. In the assumption, the key updating mechanism only requires a small modification in the SN side, while the decryption information of user equipment (UEs) remains constant as soon as the UEs are validated. Note that a symmetric key mechanism is adopted for the further data transmission. Additionally, the user activities data from smartphone sensors are analyzed for continuous authentication, which is periodically conducted after the initial validation. Note that in the assumed scenario, most of the UEs are out of the effective range of cellular networks. In this case, the UEs are capable of conducting data exchange without cellular connection. Security analysis demonstrates that the proposed scheme can provide adequate security properties as well as resistance to various attacks. Furthermore, performance analysis proves that the proposed scheme is efficient compared with state-of-the-art D2D authentication schemes.</jats:p> Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis Symmetry |
spellingShingle | Tan, Haowen, Song, Yuanzhao, Xuan, Shichang, Pan, Sungbum, Chung, Ilyong, Symmetry, Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis, Physics and Astronomy (miscellaneous), General Mathematics, Chemistry (miscellaneous), Computer Science (miscellaneous) |
title | Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis |
title_full | Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis |
title_fullStr | Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis |
title_full_unstemmed | Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis |
title_short | Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis |
title_sort | secure d2d group authentication employing smartphone sensor behavior analysis |
title_unstemmed | Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis |
topic | Physics and Astronomy (miscellaneous), General Mathematics, Chemistry (miscellaneous), Computer Science (miscellaneous) |
url | http://dx.doi.org/10.3390/sym11080969 |