Skip to main content

Enhancement of Security and Confidentiality for D2D Communication in LTE-Advanced Network Using Optimised Protocol

  • Conference paper
  • First Online:
Wireless Communication Networks and Internet of Things

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 493))

Abstract

Third Generation Partnership Projects (3GPPs) introduced fourth generation of wireless communication entitled Long-Term Evolution-Advanced (LTE-A). Security always plays a vital role in communication. Device-to-device (D2D) communication in LTE-A in between user equipments can be carried out using Secure Data Sharing Strategy (SeDS) via evolved node B (eNB) and Gateway (GW). But, communication between eNB and GW is not secure. And if this part of system will not be secure, further communication may get hampered. In this paper, implementation of optimised protocol has been shown. The proposed protocol enhances security in data communication between the nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jengyueng C, Chunchuan Y, Yiting M (2015) A novel smart forwarding scheme in LTE-Advanced networks. China Commun 12(3):120–131

    Article  Google Scholar 

  2. Choi D, Choi HK (2013) An group-based security protocol for machine type communications in LTE-Advanced. J Korea Inst Inf Secur Cryptology 23(5):885–896

    Article  Google Scholar 

  3. Militano L, Condoluci M, Araniti G, Molinaro A, Iera A (2014) When D2D communication improves group oriented services in beyond 4G networks. Wireless Netw 21(4):1363–1377

    Article  Google Scholar 

  4. Ramasubramanian S, Chung S, Ryu S, Ding L (2015) Secure and smart media sharing based on a novel mobile device-to-device communication framework with security and procedures. ACM 35–49

    Google Scholar 

  5. Zhang A, Chen J, Hu R, Qian Y (2016) SeDS: secure data sharing strategy for D2D communication in LTE-Advanced networks. IEEE Trans Veh Technol 65(4):2659–2672

    Article  Google Scholar 

  6. Sharma A, Trivedi A, Roberts N (2015) Efficient load balancing using D2D communication and biasing in LTE-Advance Het-Nets. ACM

    Google Scholar 

  7. Tang H, Ding Z, Levy B (2014) Enabling D2D communications through neighbor discovery in LTE cellular networks. IEEE Trans Signal Process 62(19):5157–5170

    Article  MathSciNet  Google Scholar 

  8. Lu R, Lin X, Shen X (2013) SPOC: a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEzaEE Trans Parallel Distrib Syst 24(3):614–624

    Article  Google Scholar 

  9. Mana M, Feham M, Bensaber B (2011) Trust key management scheme for wireless body area networks. Int J Netw Secur 12(2):75–83

    Google Scholar 

  10. Liang X, Li X, Lu R, Lin X, Shen X (2012) Morality-driven data forwarding with privacy preservation in mobile social network. IEEE Trans Veh Technol 61(7):3209–3222

    Article  Google Scholar 

  11. Hao Y, Tang J, Cheng Y (2013) Secure cooperative data downloading in vehicular ad hoc networks. IEEE J Sel Areas Commun 31(9):523–537

    Article  Google Scholar 

  12. Boneh D, Franklin M (2001) Identity-based encryption from the Weil pairing. In: Annual international cryptology conference, vol 2139, LNCS, Springer, pp 213–229

    Chapter  Google Scholar 

  13. Soran H (2014) Lightweight security solutions for LTE/LTE-A networks. Networking and internet architecture [cs.NI]. Universit_e Paris Sud—Paris XI

    Google Scholar 

  14. Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Perumal Vijayakumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tayade, P.P., Vijayakumar, P. (2019). Enhancement of Security and Confidentiality for D2D Communication in LTE-Advanced Network Using Optimised Protocol. In: Zungeru, A., Subashini, S., Vetrivelan, P. (eds) Wireless Communication Networks and Internet of Things. Lecture Notes in Electrical Engineering, vol 493. Springer, Singapore. https://doi.org/10.1007/978-981-10-8663-2_14

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8663-2_14

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8662-5

  • Online ISBN: 978-981-10-8663-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics