author_facet Tan, Haowen
Song, Yuanzhao
Xuan, Shichang
Pan, Sungbum
Chung, Ilyong
Tan, Haowen
Song, Yuanzhao
Xuan, Shichang
Pan, Sungbum
Chung, Ilyong
author Tan, Haowen
Song, Yuanzhao
Xuan, Shichang
Pan, Sungbum
Chung, Ilyong
spellingShingle Tan, Haowen
Song, Yuanzhao
Xuan, Shichang
Pan, Sungbum
Chung, Ilyong
Symmetry
Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis
Physics and Astronomy (miscellaneous)
General Mathematics
Chemistry (miscellaneous)
Computer Science (miscellaneous)
author_sort tan, haowen
spelling Tan, Haowen Song, Yuanzhao Xuan, Shichang Pan, Sungbum Chung, Ilyong 2073-8994 MDPI AG Physics and Astronomy (miscellaneous) General Mathematics Chemistry (miscellaneous) Computer Science (miscellaneous) http://dx.doi.org/10.3390/sym11080969 <jats:p>Nowadays, with rapid advancement of both the upcoming 5G architecture construction and emerging Internet of Things (IoT) scenarios, Device-to-Device (D2D) communication provides a novel paradigm for mobile networking. By facilitating continuous and high data rate services between physically proximate devices without interconnection with access points (AP) or service network (SN), spectral efficiency of the 5G network can be drastically increased. However, due to its inherent open wireless communicating features, security issues and privacy risks in D2D communication remain unsolved in spite of its benefits and prosperous future. Hence, proper D2D authentication mechanisms among the D2D entities are of great significance. Moreover, the increasing proliferation of smartphones enables seamlessly biometric sensor data collecting and processing, which highly correspond to the user’s unique behavioral characteristics. For the above consideration, we present a secure certificateless D2D authenticating mechanism intended for extreme scenarios in this paper. In the assumption, the key updating mechanism only requires a small modification in the SN side, while the decryption information of user equipment (UEs) remains constant as soon as the UEs are validated. Note that a symmetric key mechanism is adopted for the further data transmission. Additionally, the user activities data from smartphone sensors are analyzed for continuous authentication, which is periodically conducted after the initial validation. Note that in the assumed scenario, most of the UEs are out of the effective range of cellular networks. In this case, the UEs are capable of conducting data exchange without cellular connection. Security analysis demonstrates that the proposed scheme can provide adequate security properties as well as resistance to various attacks. Furthermore, performance analysis proves that the proposed scheme is efficient compared with state-of-the-art D2D authentication schemes.</jats:p> Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis Symmetry
doi_str_mv 10.3390/sym11080969
facet_avail Online
Free
finc_class_facet Physik
Chemie und Pharmazie
Technik
Informatik
format ElectronicArticle
fullrecord blob:ai-49-aHR0cDovL2R4LmRvaS5vcmcvMTAuMzM5MC9zeW0xMTA4MDk2OQ
id ai-49-aHR0cDovL2R4LmRvaS5vcmcvMTAuMzM5MC9zeW0xMTA4MDk2OQ
institution DE-D275
DE-Bn3
DE-Brt1
DE-Zwi2
DE-D161
DE-Gla1
DE-Zi4
DE-15
DE-Rs1
DE-Pl11
DE-105
DE-14
DE-Ch1
DE-L229
imprint MDPI AG, 2019
imprint_str_mv MDPI AG, 2019
issn 2073-8994
issn_str_mv 2073-8994
language English
mega_collection MDPI AG (CrossRef)
match_str tan2019secured2dgroupauthenticationemployingsmartphonesensorbehavioranalysis
publishDateSort 2019
publisher MDPI AG
recordtype ai
record_format ai
series Symmetry
source_id 49
title Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis
title_unstemmed Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis
title_full Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis
title_fullStr Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis
title_full_unstemmed Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis
title_short Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis
title_sort secure d2d group authentication employing smartphone sensor behavior analysis
topic Physics and Astronomy (miscellaneous)
General Mathematics
Chemistry (miscellaneous)
Computer Science (miscellaneous)
url http://dx.doi.org/10.3390/sym11080969
publishDate 2019
physical 969
description <jats:p>Nowadays, with rapid advancement of both the upcoming 5G architecture construction and emerging Internet of Things (IoT) scenarios, Device-to-Device (D2D) communication provides a novel paradigm for mobile networking. By facilitating continuous and high data rate services between physically proximate devices without interconnection with access points (AP) or service network (SN), spectral efficiency of the 5G network can be drastically increased. However, due to its inherent open wireless communicating features, security issues and privacy risks in D2D communication remain unsolved in spite of its benefits and prosperous future. Hence, proper D2D authentication mechanisms among the D2D entities are of great significance. Moreover, the increasing proliferation of smartphones enables seamlessly biometric sensor data collecting and processing, which highly correspond to the user’s unique behavioral characteristics. For the above consideration, we present a secure certificateless D2D authenticating mechanism intended for extreme scenarios in this paper. In the assumption, the key updating mechanism only requires a small modification in the SN side, while the decryption information of user equipment (UEs) remains constant as soon as the UEs are validated. Note that a symmetric key mechanism is adopted for the further data transmission. Additionally, the user activities data from smartphone sensors are analyzed for continuous authentication, which is periodically conducted after the initial validation. Note that in the assumed scenario, most of the UEs are out of the effective range of cellular networks. In this case, the UEs are capable of conducting data exchange without cellular connection. Security analysis demonstrates that the proposed scheme can provide adequate security properties as well as resistance to various attacks. Furthermore, performance analysis proves that the proposed scheme is efficient compared with state-of-the-art D2D authentication schemes.</jats:p>
container_issue 8
container_start_page 0
container_title Symmetry
container_volume 11
format_de105 Article, E-Article
format_de14 Article, E-Article
format_de15 Article, E-Article
format_de520 Article, E-Article
format_de540 Article, E-Article
format_dech1 Article, E-Article
format_ded117 Article, E-Article
format_degla1 E-Article
format_del152 Buch
format_del189 Article, E-Article
format_dezi4 Article
format_dezwi2 Article, E-Article
format_finc Article, E-Article
format_nrw Article, E-Article
_version_ 1792332137595142147
geogr_code not assigned
last_indexed 2024-03-01T13:52:05.821Z
geogr_code_person not assigned
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fvufind.svn.sourceforge.net%3Agenerator&rft.title=Secure+D2D+Group+Authentication+Employing+Smartphone+Sensor+Behavior+Analysis&rft.date=2019-08-01&genre=article&issn=2073-8994&volume=11&issue=8&pages=969&jtitle=Symmetry&atitle=Secure+D2D+Group+Authentication+Employing+Smartphone+Sensor+Behavior+Analysis&aulast=Chung&aufirst=Ilyong&rft_id=info%3Adoi%2F10.3390%2Fsym11080969&rft.language%5B0%5D=eng
SOLR
_version_ 1792332137595142147
author Tan, Haowen, Song, Yuanzhao, Xuan, Shichang, Pan, Sungbum, Chung, Ilyong
author_facet Tan, Haowen, Song, Yuanzhao, Xuan, Shichang, Pan, Sungbum, Chung, Ilyong, Tan, Haowen, Song, Yuanzhao, Xuan, Shichang, Pan, Sungbum, Chung, Ilyong
author_sort tan, haowen
container_issue 8
container_start_page 0
container_title Symmetry
container_volume 11
description <jats:p>Nowadays, with rapid advancement of both the upcoming 5G architecture construction and emerging Internet of Things (IoT) scenarios, Device-to-Device (D2D) communication provides a novel paradigm for mobile networking. By facilitating continuous and high data rate services between physically proximate devices without interconnection with access points (AP) or service network (SN), spectral efficiency of the 5G network can be drastically increased. However, due to its inherent open wireless communicating features, security issues and privacy risks in D2D communication remain unsolved in spite of its benefits and prosperous future. Hence, proper D2D authentication mechanisms among the D2D entities are of great significance. Moreover, the increasing proliferation of smartphones enables seamlessly biometric sensor data collecting and processing, which highly correspond to the user’s unique behavioral characteristics. For the above consideration, we present a secure certificateless D2D authenticating mechanism intended for extreme scenarios in this paper. In the assumption, the key updating mechanism only requires a small modification in the SN side, while the decryption information of user equipment (UEs) remains constant as soon as the UEs are validated. Note that a symmetric key mechanism is adopted for the further data transmission. Additionally, the user activities data from smartphone sensors are analyzed for continuous authentication, which is periodically conducted after the initial validation. Note that in the assumed scenario, most of the UEs are out of the effective range of cellular networks. In this case, the UEs are capable of conducting data exchange without cellular connection. Security analysis demonstrates that the proposed scheme can provide adequate security properties as well as resistance to various attacks. Furthermore, performance analysis proves that the proposed scheme is efficient compared with state-of-the-art D2D authentication schemes.</jats:p>
doi_str_mv 10.3390/sym11080969
facet_avail Online, Free
finc_class_facet Physik, Chemie und Pharmazie, Technik, Informatik
format ElectronicArticle
format_de105 Article, E-Article
format_de14 Article, E-Article
format_de15 Article, E-Article
format_de520 Article, E-Article
format_de540 Article, E-Article
format_dech1 Article, E-Article
format_ded117 Article, E-Article
format_degla1 E-Article
format_del152 Buch
format_del189 Article, E-Article
format_dezi4 Article
format_dezwi2 Article, E-Article
format_finc Article, E-Article
format_nrw Article, E-Article
geogr_code not assigned
geogr_code_person not assigned
id ai-49-aHR0cDovL2R4LmRvaS5vcmcvMTAuMzM5MC9zeW0xMTA4MDk2OQ
imprint MDPI AG, 2019
imprint_str_mv MDPI AG, 2019
institution DE-D275, DE-Bn3, DE-Brt1, DE-Zwi2, DE-D161, DE-Gla1, DE-Zi4, DE-15, DE-Rs1, DE-Pl11, DE-105, DE-14, DE-Ch1, DE-L229
issn 2073-8994
issn_str_mv 2073-8994
language English
last_indexed 2024-03-01T13:52:05.821Z
match_str tan2019secured2dgroupauthenticationemployingsmartphonesensorbehavioranalysis
mega_collection MDPI AG (CrossRef)
physical 969
publishDate 2019
publishDateSort 2019
publisher MDPI AG
record_format ai
recordtype ai
series Symmetry
source_id 49
spelling Tan, Haowen Song, Yuanzhao Xuan, Shichang Pan, Sungbum Chung, Ilyong 2073-8994 MDPI AG Physics and Astronomy (miscellaneous) General Mathematics Chemistry (miscellaneous) Computer Science (miscellaneous) http://dx.doi.org/10.3390/sym11080969 <jats:p>Nowadays, with rapid advancement of both the upcoming 5G architecture construction and emerging Internet of Things (IoT) scenarios, Device-to-Device (D2D) communication provides a novel paradigm for mobile networking. By facilitating continuous and high data rate services between physically proximate devices without interconnection with access points (AP) or service network (SN), spectral efficiency of the 5G network can be drastically increased. However, due to its inherent open wireless communicating features, security issues and privacy risks in D2D communication remain unsolved in spite of its benefits and prosperous future. Hence, proper D2D authentication mechanisms among the D2D entities are of great significance. Moreover, the increasing proliferation of smartphones enables seamlessly biometric sensor data collecting and processing, which highly correspond to the user’s unique behavioral characteristics. For the above consideration, we present a secure certificateless D2D authenticating mechanism intended for extreme scenarios in this paper. In the assumption, the key updating mechanism only requires a small modification in the SN side, while the decryption information of user equipment (UEs) remains constant as soon as the UEs are validated. Note that a symmetric key mechanism is adopted for the further data transmission. Additionally, the user activities data from smartphone sensors are analyzed for continuous authentication, which is periodically conducted after the initial validation. Note that in the assumed scenario, most of the UEs are out of the effective range of cellular networks. In this case, the UEs are capable of conducting data exchange without cellular connection. Security analysis demonstrates that the proposed scheme can provide adequate security properties as well as resistance to various attacks. Furthermore, performance analysis proves that the proposed scheme is efficient compared with state-of-the-art D2D authentication schemes.</jats:p> Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis Symmetry
spellingShingle Tan, Haowen, Song, Yuanzhao, Xuan, Shichang, Pan, Sungbum, Chung, Ilyong, Symmetry, Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis, Physics and Astronomy (miscellaneous), General Mathematics, Chemistry (miscellaneous), Computer Science (miscellaneous)
title Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis
title_full Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis
title_fullStr Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis
title_full_unstemmed Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis
title_short Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis
title_sort secure d2d group authentication employing smartphone sensor behavior analysis
title_unstemmed Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis
topic Physics and Astronomy (miscellaneous), General Mathematics, Chemistry (miscellaneous), Computer Science (miscellaneous)
url http://dx.doi.org/10.3390/sym11080969