Authorization based on mobile whitelist in devices for device-to-device communications

Seohee You, Dana Yang, Inshil Doh, Kijoon Chae

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

In mobile networking, D2D (Device-to-Device) communication extends the network beyond the reliance of existing base stations and provides a flexible data exchange. In other words, D2D allows short range communications to be collected for short range service support in a network. Main challenges in this communication environment include threats from third party devices and unnecessary calculations for communication. In this paper, we propose a method to secure communication focused on security and privacy by establishing a specialized authentication connection in D2D based in light of previous studies. Therefore, we use a device whitelist mechanism to secure communication protocols in order to prevent personal information leaks, denial of service, and masquerading that may occur in mobile communications. Consequently, we created a protocol that introduces the concept of whitelist permission to enhance device communication security. This study confirms that the risk of existing D2D and the incessant short distance communication overhead can be lowered and security can be increased.

Original languageEnglish
Title of host publication32nd International Conference on Information Networking, ICOIN 2018
PublisherIEEE Computer Society
Pages706-711
Number of pages6
ISBN (Electronic)9781538622896
DOIs
StatePublished - 19 Apr 2018
Event32nd International Conference on Information Networking, ICOIN 2018 - Chiang Mai, Thailand
Duration: 10 Jan 201812 Jan 2018

Publication series

NameInternational Conference on Information Networking
Volume2018-January
ISSN (Print)1976-7684

Conference

Conference32nd International Conference on Information Networking, ICOIN 2018
Country/TerritoryThailand
CityChiang Mai
Period10/01/1812/01/18

Bibliographical note

Funding Information:
ACKNOWLEDGMENT This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIP) (No. 2016R1A2B4015899). Kijoon Chae is the corresponding author.

Funding Information:
This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIP) (No. 2016R1A2B4015899).

Publisher Copyright:
© 2018 IEEE.

Keywords

  • Authorization
  • D2D communication
  • IoT
  • Mobile Collusion
  • Mobile Device
  • Network Security
  • Whitelist

Fingerprint

Dive into the research topics of 'Authorization based on mobile whitelist in devices for device-to-device communications'. Together they form a unique fingerprint.

Cite this