Tampere University of Technology

TUTCRIS Research Portal

Validating information security framework for offloading from LTE onto D2D links

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Details

Original languageEnglish
Title of host publicationProceedings of the 18th Conference of Open Innovations Association FRUCT and Seminar on Information Security and Protection of Information Technolog, FRUCT-ISPIT 2016
PublisherIEEE COMPUTER SOCIETY PRESS
Pages241-247
Number of pages7
ISBN (Electronic)9789526839721
DOIs
Publication statusPublished - 6 Sep 2016
Publication typeA4 Article in a conference publication
EventConference of the Open Innovations Association FRUCT -
Duration: 1 Jan 1900 → …

Publication series

Name
ISSN (Electronic)2305-7254

Conference

ConferenceConference of the Open Innovations Association FRUCT
Period1/01/00 → …

Abstract

D2D communications is one of the key technologies to enable aggressive spatial frequency reuse in future evolution of cellular systems. While the standardization efforts are far from their final stage there is clear understanding that security is one of the major concerns for proximity services. This is especially the case when one or more communicating stations in a logical cluster do not have an active connection to the serving base station. In this paper we propose a solution for secure throughput optimized communications in D2D-assisted cellular system. In order to provide additional throughput, a game-theoretic optimization approach is considered by taking into account social relationships and devices proximity. The proposed solution is agnostic to the chosen D2D communications technology (i.e., WiFi or LTE) and suitable for any possible cluster combination in full and partial cellular coverage. Performance evaluation of the proposed security framework show that social proximity information available at the D2D devices may substantially improves the system performance in term of throughput with respect to the standard security procedures. Finally, for sake of completeness, the effect of mobility for the reference scenario is evaluated.