Abstract
In mobile networking, D2D (Device-to-Device) communication extends the network beyond the reliance of existing base stations and provides a flexible data exchange. In other words, D2D allows short range communications to be collected for short range service support in a network. Main challenges in this communication environment include threats from third party devices and unnecessary calculations for communication. In this paper, we propose a method to secure communication focused on security and privacy by establishing a specialized authentication connection in D2D based in light of previous studies. Therefore, we use a device whitelist mechanism to secure communication protocols in order to prevent personal information leaks, denial of service, and masquerading that may occur in mobile communications. Consequently, we created a protocol that introduces the concept of whitelist permission to enhance device communication security. This study confirms that the risk of existing D2D and the incessant short distance communication overhead can be lowered and security can be increased.
Original language | English |
---|---|
Title of host publication | 32nd International Conference on Information Networking, ICOIN 2018 |
Publisher | IEEE Computer Society |
Pages | 706-711 |
Number of pages | 6 |
ISBN (Electronic) | 9781538622896 |
DOIs | |
State | Published - 19 Apr 2018 |
Event | 32nd International Conference on Information Networking, ICOIN 2018 - Chiang Mai, Thailand Duration: 10 Jan 2018 → 12 Jan 2018 |
Publication series
Name | International Conference on Information Networking |
---|---|
Volume | 2018-January |
ISSN (Print) | 1976-7684 |
Conference
Conference | 32nd International Conference on Information Networking, ICOIN 2018 |
---|---|
Country/Territory | Thailand |
City | Chiang Mai |
Period | 10/01/18 → 12/01/18 |
Bibliographical note
Publisher Copyright:© 2018 IEEE.
Keywords
- Authorization
- D2D communication
- IoT
- Mobile Collusion
- Mobile Device
- Network Security
- Whitelist