View : 714 Download: 0

Authorization based on mobile whitelist in devices for device-to-device communications

Title
Authorization based on mobile whitelist in devices for device-to-device communications
Authors
You S.Yang D.Doh I.Chae K.
Ewha Authors
도인실
Issue Date
2018
Journal Title
International Conference on Information Networking
ISSN
1976-7684JCR Link
Citation
International Conference on Information Networking vol. 2018-January, pp. 706 - 711
Keywords
AuthorizationD2D communicationIoTMobile CollusionMobile DeviceNetwork SecurityWhitelist
Publisher
IEEE Computer Society
Indexed
SCOPUS scopus
Document Type
Conference Paper
Abstract
In mobile networking, D2D (Device-to-Device) communication extends the network beyond the reliance of existing base stations and provides a flexible data exchange. In other words, D2D allows short range communications to be collected for short range service support in a network. Main challenges in this communication environment include threats from third party devices and unnecessary calculations for communication. In this paper, we propose a method to secure communication focused on security and privacy by establishing a specialized authentication connection in D2D based in light of previous studies. Therefore, we use a device whitelist mechanism to secure communication protocols in order to prevent personal information leaks, denial of service, and masquerading that may occur in mobile communications. Consequently, we created a protocol that introduces the concept of whitelist permission to enhance device communication security. This study confirms that the risk of existing D2D and the incessant short distance communication overhead can be lowered and security can be increased. © 2018 IEEE.
DOI
10.1109/ICOIN.2018.8343210
ISBN
9781538622896
Appears in Collections:
인공지능대학 > 컴퓨터공학과 > Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

BROWSE