Secure device-to-device communication in LTE-A
dc.contributor.author | Alam, M. | * |
dc.contributor.author | Yang, D. | * |
dc.contributor.author | Rodriguez, Jonathan | * |
dc.contributor.author | Abd-Alhameed, Raed | * |
dc.date.accessioned | 2016-04-05T08:38:35Z | |
dc.date.available | 2016-04-05T08:38:35Z | |
dc.date.issued | 2014-04 | |
dc.date.issued | 2014-04 | |
dc.identifier.citation | Alam M, Yang D, Rodriguez J et al (2014) Secure device-to-device communication in LTE-A. IEEE Communications Magazine. 52(4): 66-73. | en_US |
dc.identifier.uri | http://hdl.handle.net/10454/8061 | |
dc.identifier.uri | http://hdl.handle.net/10454/8061 | |
dc.description | No | en_US |
dc.description.abstract | Enabling D2D communications over LTE-A networks can provide many benefits in terms of throughput, energy consumption, traffic load, and so on. It also enables new commercial services such as location-based advertising. For these reasons, D2D communications has become a hot topic in both the academic and industrial communities. However, many research works are focused on node discovery, radio resource management, and other aspects, while the issue of security is less addressed. In this article, we intend to provide an overview of the security architecture, threads, and requirements. Based on these requirements, we propose several potential solutions by reusing the existing security mechanisms. Promising topics related to secure D2D communications for future research are also discussed. | en_US |
dc.language.iso | en | en_US |
dc.subject | Secure device-to-device communication | en_US |
dc.subject | D2D | |
dc.subject | LTE-A networks | |
dc.title | Secure device-to-device communication in LTE-A | en_US |
dc.status.refereed | Yes | en_US |
dc.type | Article | en_US |
dc.type.version | No full-text in the repository | en_US |
dc.identifier.doi | https://doi.org/10.1109/MCOM.2014.6807948 |