Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 도인실 | * |
dc.date.accessioned | 2018-05-30T08:13:22Z | - |
dc.date.available | 2018-05-30T08:13:22Z | - |
dc.date.issued | 2018 | * |
dc.identifier.isbn | 9781538622896 | * |
dc.identifier.issn | 1976-7684 | * |
dc.identifier.other | OAK-22479 | * |
dc.identifier.uri | https://dspace.ewha.ac.kr/handle/2015.oak/243276 | - |
dc.description.abstract | In mobile networking, D2D (Device-to-Device) communication extends the network beyond the reliance of existing base stations and provides a flexible data exchange. In other words, D2D allows short range communications to be collected for short range service support in a network. Main challenges in this communication environment include threats from third party devices and unnecessary calculations for communication. In this paper, we propose a method to secure communication focused on security and privacy by establishing a specialized authentication connection in D2D based in light of previous studies. Therefore, we use a device whitelist mechanism to secure communication protocols in order to prevent personal information leaks, denial of service, and masquerading that may occur in mobile communications. Consequently, we created a protocol that introduces the concept of whitelist permission to enhance device communication security. This study confirms that the risk of existing D2D and the incessant short distance communication overhead can be lowered and security can be increased. © 2018 IEEE. | * |
dc.description.sponsorship | National Research Foundation of Korea | * |
dc.language | English | * |
dc.publisher | IEEE Computer Society | * |
dc.subject | Authorization | * |
dc.subject | D2D communication | * |
dc.subject | IoT | * |
dc.subject | Mobile Collusion | * |
dc.subject | Mobile Device | * |
dc.subject | Network Security | * |
dc.subject | Whitelist | * |
dc.title | Authorization based on mobile whitelist in devices for device-to-device communications | * |
dc.type | Conference Paper | * |
dc.relation.volume | 2018-January | * |
dc.relation.index | SCOPUS | * |
dc.relation.startpage | 706 | * |
dc.relation.lastpage | 711 | * |
dc.relation.journaltitle | International Conference on Information Networking | * |
dc.identifier.doi | 10.1109/ICOIN.2018.8343210 | * |
dc.identifier.scopusid | 2-s2.0-85047000261 | * |
dc.author.google | You S. | * |
dc.author.google | Yang D. | * |
dc.author.google | Doh I. | * |
dc.author.google | Chae K. | * |
dc.date.modifydate | 20240322133652 | * |