Cited time in webofscience Cited time in scopus

Full metadata record

DC Field Value Language
dc.contributor.author Hsu, Ruei-Hau -
dc.contributor.author Lee, Je Min -
dc.contributor.author Quek, Tony Q. S. -
dc.contributor.author Che, Jyh-Cheng -
dc.date.available 2017-10-30T04:19:59Z -
dc.date.created 2017-10-30 -
dc.date.issued 2018-02 -
dc.identifier.citation IEEE Transactions on Information Forensics and Security, v.13, no.2, pp.449 - 464 -
dc.identifier.issn 1556-6013 -
dc.identifier.uri http://hdl.handle.net/20.500.11750/4627 -
dc.description.abstract Device-to-Device (D2D) communication is mainly launched by the transmission requirements between devices for specific applications such as Proximity Services in Long-Term Evolution Advanced (LTE-A) networks, and each application will form a group of registered devices for the network-covered and network-absent D2D communications. During the applications of D2D communication, each device needs to identify the other devices of the same group in proximity by their group identity. This leads to the exposure of group information, by which the usage of applications can be analyzed by eavesdroppers. Hence, this work introduces network-covered and network-absent authenticated key exchange protocols for D2D communications to guarantee accountable group anonymity, end-to-end security to network operators, as well as traceability and revocability for accounting and management requirements. We formally prove the security of those protocols, and also develop an analytic model to evaluate the quality of authentication protocols by authentication success rate in D2D communications. Besides, we implement the proposed protocols on android mobile devices to evaluate the computation costs of the protocols. We also evaluate the authentication success rate by the proposed analytic model and prove the correctness of the analytic model via simulation. Those evaluations show that the proposed protocols are feasible to the performance requirements of D2D communications. IEEE -
dc.language English -
dc.publisher Institute of Electrical and Electronics Engineers -
dc.title GRAAD: Group Anonymous and Accountable D2D Communication in Mobile Networks -
dc.type Article -
dc.identifier.doi 10.1109/TIFS.2017.2756567 -
dc.identifier.wosid 000417894200015 -
dc.identifier.scopusid 2-s2.0-85030706792 -
dc.type.local Article(Overseas) -
dc.type.rims ART -
dc.description.journalClass 1 -
dc.citation.publicationname IEEE Transactions on Information Forensics and Security -
dc.contributor.nonIdAuthor Hsu, Ruei-Hau -
dc.contributor.nonIdAuthor Quek, Tony Q. S. -
dc.contributor.nonIdAuthor Che, Jyh-Cheng -
dc.identifier.citationVolume 13 -
dc.identifier.citationNumber 2 -
dc.identifier.citationStartPage 449 -
dc.identifier.citationEndPage 464 -
dc.identifier.citationTitle IEEE Transactions on Information Forensics and Security -
dc.type.journalArticle Article in Press -
dc.description.isOpenAccess Y -
dc.subject.keywordAuthor D2D communication -
dc.subject.keywordAuthor proximity service -
dc.subject.keywordAuthor group anonymity -
dc.subject.keywordAuthor mutual authentication -
dc.subject.keywordAuthor end-to-end security -
dc.subject.keywordPlus AUTHENTICATION SCHEME -
dc.subject.keywordPlus SECRET HANDSHAKES -
dc.subject.keywordPlus WIRELESS COMMUNICATIONS -
dc.subject.keywordPlus PROTOCOLS -
dc.subject.keywordPlus ENCRYPTION -
dc.subject.keywordPlus SECURITY -
dc.contributor.affiliatedAuthor Hsu, Ruei-Hau -
dc.contributor.affiliatedAuthor Lee, Je Min -
dc.contributor.affiliatedAuthor Quek, Tony Q. S. -
dc.contributor.affiliatedAuthor Che, Jyh-Cheng -
Files in This Item:

There are no files associated with this item.

Appears in Collections:
Department of Electrical Engineering and Computer Science ISC(Information Security and Communication) Lab 1. Journal Articles

qrcode

  • twitter
  • facebook
  • mendeley

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE