Skip to main content

Secure Opportunistic Data Exchange Using Smart Devices in 5G/LTE-A Networks

  • Conference paper
  • First Online:
Security and Privacy (ISEA-ISAP 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 939))

Included in the following conference series:

Abstract

Popularity of smart phones is increasing rapidly with the facility of Internet through 5G/LTE-A networks. Internet helps to share contents and brings about digital activities through smart devices. Meanwhile, it is a challenging task to communicate or access data in absence of the primary network signal. For members of such a disconnected network, the opportunity of data exchange through a visiting smart phone user, would be a prominent solution. However, security in such a scenario would be the major concern due to the possibility of mishandling of users’ data and therefore, data to be exchanged only to authentic users. In this work, we propose a security framework for opportunistic data exchange in cellular networks. We analyze and evaluate the performance of our protocol with existing schemes providing secure data exchange through device-to-device (D2D) communication. Results show that our proposed framework achieves desired security while consuming significantly less communication overhead. Further, the security of our scheme is verified through AVISPA simulator.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. 3rd Generation Partnership Project. Technical Specification Group Services and System Aspects; 3G security; Network Domain Security (NDS); IP network layer security (Rel 13), 3GPP TS 33.210 V13.0.0, December 2015

    Google Scholar 

  2. 3rd Generation Partnership Project. Technical Specification Group Services and System Aspects; Network Domain Security (NDS); Authentication Framework (AF) (Rel 13), 3GPP TS 33.310 V13.0.0, December 2015

    Google Scholar 

  3. Alam, M., Yang, D., Rodriguez, J., Abd-alhameed, R.: Secure device-to-device communication in LTE-A. IEEE Commun. Mag. 52(4), 66–73 (2014)

    Article  Google Scholar 

  4. Armando, A., et al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281–285. Springer, Heidelberg (2005). https://doi.org/10.1007/11513988_27

    Chapter  Google Scholar 

  5. Draishpits, G.: Peer-to-peer communication in wireless networks as an alternative to internet access. Ph.D. thesis, The Open University (2016)

    Google Scholar 

  6. Ekberg, J.E., Uusitalo, M.A., Li, Z.: Device-to-device communication security with authentication certificates. US Patent 9,960,922, 1 May 2018

    Google Scholar 

  7. Fall, K.: A delay-tolerant network architecture for challenged internets. In: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 27–34. ACM (2003)

    Google Scholar 

  8. Liu, Y., et al.: Methods and apparatus for generating keys in device-to-device communications. US Patent 9,660,804, 23 May 2017

    Google Scholar 

  9. Neuman, B.C., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Commun. Mag. 32(9), 33–38 (1994)

    Article  Google Scholar 

  10. Pelusi, L., Passarella, A., Conti, M.: Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Commun. Ma. 44(11), 134–141 (2006)

    Article  Google Scholar 

  11. Tetarave, S.K., Tripathy, S., Ghosh, R.K.: GMP2P: mobile P2P over GSM for efficient file sharing. In: Negi, A., Bhatnagar, R., Parida, L. (eds.) ICDCIT 2018. LNCS, vol. 10722, pp. 217–231. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-72344-0_18

    Chapter  Google Scholar 

  12. Tetarave, S.K., Tripathy, S., Ghosh, R.: V-Chord: an efficient file sharing on LTE/GSM network. In: Proceedings of the 19th International Conference on Distributed Computing and Networking, p. 38. ACM (2018)

    Google Scholar 

  13. HLPSL Tutorial: A beginners guide to modelling and analysing internet security protocols (2005). Available at [AH-03] (2009)

    Google Scholar 

  14. Wang, J.T., Lin, T.M.: Authentication system for device-to-device communication and authentication method therefore. US Patent 9,232,391, 5 January 2016

    Google Scholar 

  15. Wang, M., Yan, Z., Niemi, V.: UAKA-D2D: universal authentication and key agreement protocol in D2D communications. Mob. Netw. Appl. 22(3), 510–525 (2017)

    Article  Google Scholar 

  16. Zulhasnine, M., Huang, C., Srinivasan, A.: Towards an effective integration of cellular users to the structured peer-to-peer network. Peer Peer Netw. Appl. 5(2), 178–192 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Sumit Kumar Tetarave or Somanath Tripathy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tetarave, S.K., Tripathy, S. (2019). Secure Opportunistic Data Exchange Using Smart Devices in 5G/LTE-A Networks. In: Nandi, S., Jinwala, D., Singh, V., Laxmi, V., Gaur, M., Faruki, P. (eds) Security and Privacy. ISEA-ISAP 2019. Communications in Computer and Information Science, vol 939. Springer, Singapore. https://doi.org/10.1007/978-981-13-7561-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-7561-3_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-7560-6

  • Online ISBN: 978-981-13-7561-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics