Abstract
Popularity of smart phones is increasing rapidly with the facility of Internet through 5G/LTE-A networks. Internet helps to share contents and brings about digital activities through smart devices. Meanwhile, it is a challenging task to communicate or access data in absence of the primary network signal. For members of such a disconnected network, the opportunity of data exchange through a visiting smart phone user, would be a prominent solution. However, security in such a scenario would be the major concern due to the possibility of mishandling of users’ data and therefore, data to be exchanged only to authentic users. In this work, we propose a security framework for opportunistic data exchange in cellular networks. We analyze and evaluate the performance of our protocol with existing schemes providing secure data exchange through device-to-device (D2D) communication. Results show that our proposed framework achieves desired security while consuming significantly less communication overhead. Further, the security of our scheme is verified through AVISPA simulator.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
3rd Generation Partnership Project. Technical Specification Group Services and System Aspects; 3G security; Network Domain Security (NDS); IP network layer security (Rel 13), 3GPP TS 33.210 V13.0.0, December 2015
3rd Generation Partnership Project. Technical Specification Group Services and System Aspects; Network Domain Security (NDS); Authentication Framework (AF) (Rel 13), 3GPP TS 33.310 V13.0.0, December 2015
Alam, M., Yang, D., Rodriguez, J., Abd-alhameed, R.: Secure device-to-device communication in LTE-A. IEEE Commun. Mag. 52(4), 66–73 (2014)
Armando, A., et al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281–285. Springer, Heidelberg (2005). https://doi.org/10.1007/11513988_27
Draishpits, G.: Peer-to-peer communication in wireless networks as an alternative to internet access. Ph.D. thesis, The Open University (2016)
Ekberg, J.E., Uusitalo, M.A., Li, Z.: Device-to-device communication security with authentication certificates. US Patent 9,960,922, 1 May 2018
Fall, K.: A delay-tolerant network architecture for challenged internets. In: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 27–34. ACM (2003)
Liu, Y., et al.: Methods and apparatus for generating keys in device-to-device communications. US Patent 9,660,804, 23 May 2017
Neuman, B.C., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Commun. Mag. 32(9), 33–38 (1994)
Pelusi, L., Passarella, A., Conti, M.: Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Commun. Ma. 44(11), 134–141 (2006)
Tetarave, S.K., Tripathy, S., Ghosh, R.K.: GMP2P: mobile P2P over GSM for efficient file sharing. In: Negi, A., Bhatnagar, R., Parida, L. (eds.) ICDCIT 2018. LNCS, vol. 10722, pp. 217–231. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-72344-0_18
Tetarave, S.K., Tripathy, S., Ghosh, R.: V-Chord: an efficient file sharing on LTE/GSM network. In: Proceedings of the 19th International Conference on Distributed Computing and Networking, p. 38. ACM (2018)
HLPSL Tutorial: A beginners guide to modelling and analysing internet security protocols (2005). Available at [AH-03] (2009)
Wang, J.T., Lin, T.M.: Authentication system for device-to-device communication and authentication method therefore. US Patent 9,232,391, 5 January 2016
Wang, M., Yan, Z., Niemi, V.: UAKA-D2D: universal authentication and key agreement protocol in D2D communications. Mob. Netw. Appl. 22(3), 510–525 (2017)
Zulhasnine, M., Huang, C., Srinivasan, A.: Towards an effective integration of cellular users to the structured peer-to-peer network. Peer Peer Netw. Appl. 5(2), 178–192 (2012)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Tetarave, S.K., Tripathy, S. (2019). Secure Opportunistic Data Exchange Using Smart Devices in 5G/LTE-A Networks. In: Nandi, S., Jinwala, D., Singh, V., Laxmi, V., Gaur, M., Faruki, P. (eds) Security and Privacy. ISEA-ISAP 2019. Communications in Computer and Information Science, vol 939. Springer, Singapore. https://doi.org/10.1007/978-981-13-7561-3_1
Download citation
DOI: https://doi.org/10.1007/978-981-13-7561-3_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-7560-6
Online ISBN: 978-981-13-7561-3
eBook Packages: Computer ScienceComputer Science (R0)