doi: 10.17586/2226-1494-2017-17-1-100-109


A. Y. Ometov, S. D. Andreev, A. B. Levina, S. V. Bezzateev, A. Orsino

Read the full article  ';
Article in Russian

For citation: Ometov A.Ya., Andreev S.D., Levina A.B., Bezzateev S.V., Orsino A. On information security solutions applicable to D2D communications within the 5G domain: analyzing the influence of user mobility. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2017, vol. 17, no. 1, pp. 100–109. doi: 10.17586/2226-1494-2017-17-1-100-109


The paper deals with the problems of peer-to-peer systems such as Device-to-Device (D2D) operating in 5G networks. First, we consider the task of ensuring secure, direct connections between mobile users by utilizing the developed simulator. We present results of the dynamic user clustering in geographical proximity exchanging packet data and Levy flight mobility model. The study results give the possibility to determine benefits of the technology integration in the 3GPP LTE network in terms of throughput. We have shown that technology implementation provides a system capacity increase up to 30% with a slight growth in the time required for the initialization of direct connections. The results may be useful for the academy and industrial experts working in the field of telecommunication systems and information security.

Keywords: information security, 5G, D2D

1.     Adams C., Lloyd S. Understanding PKI: Concepts, Standards, and Deployment Considerations. 2nd ed. Addison-Wesley Professional, 2003, 322 p.
2.     Boronin P.N., Kucheryavy A.E. Internet of Things as a new concept of the telecommunication networks development. Informatsionnye Tekhnologii i Telekommunikatsii, 2014, no. 3, pp. 7–30. (In Russian)
3.     Haas Z.J., Deng J., Liang B., Papadimitratos P., Sajama S. Wireless Ad Hoc Networks. Encyclopedia of Telecommunications. John Wiley and Sons, 2002.
4.     Muthanna S., Kucheryavy A.E. D2D-communication in the 5G mobile networks. Informatsionnye Tekhnologii i Telekommunikatsii, 2014, no. 4, pp. 51–63.(In Russian)
5.     Khalili A., Katz J., Arbaugh W.A. Toward secure key distribution in truly ad-hoc networks. Proc. Symposium on Applications and the Internet Workshops, 2003, pp. 342–346. doi: 10.1109/saintw.2003.1210183
6.     Yi X., Willemson J., Nait-Abdesselam F. Privacy-preserving wireless medical sensor network. Proc. 12th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom), 2013, pp. 118–125. doi: 10.1109/trustcom.2013.19
7.     Omjotov A.Ya., Kucheryavy A.E., Andreev S.D. About the wireless technology role for the development of ”Internet of Things”. Informatsionnye Tekhnologii i Telekommunikatsii, 2014, no. 3, pp. 31–40. (In Russian)
8.     Lu Q., Miao Q., Fodor G.,Brahmi N. Clustering schemes for D2D communications under partial/no network coverage. IEEE 79th Vehicular Technology Conference (VTC Spring), 2014, pp. 1–5.
9.     Perrig A., Stankovic J., Wagner D. Security in wireless sensor networks. Communications of the ACM, 2004, vol. 47, no. 6, pp. 53–57. doi: 10.1145/990680.990707
10.  McDaniel P., McLaughin S. Security and privacy challenges in the smart grid. IEEE Security &Privacy Magazine, 2009.vol. 7, no. 3, pp. 75–77. doi: 10.1109/msp.2009.76
11.  Hubaux J.-P., Capkun S., Luo J. The security and privacy of smart vehicles. IEEE Security & Privacy Magazine, 2004, vol. 2, no. 3, pp. 49–55. doi: 10.1109/msp.2004.26
12.  Diffie W., Hellman M.E.New directions in cryptography. IEEE Transactions on Information Theory, 1976, vol. 22, no. 6, pp. 644–654. doi: 10.1109/tit.1976.1055638
13.  Liu D., Ning P., Li R., Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security, 2005, vol. 8, no. 1, pp. 41–77. doi: 10.1145/1053283.1053287
14.  Shamir A. How to share a secret. Communications of the ACM, 1979, vol. 22, no. 11, pp. 612–613. doi: 10.1145/359168.359176
15.  Shamir A. Identity-based cryptosystems and signature schemes. Lecture Notes in Computer Science, 1985, vol. 196, pp. 47–53. doi: 10.1007/3-540-39568-7_5
16.  Perrig A., Szewczyk R., Tygar J., Wen V., Culler D.E. SPINS: Security protocols for sensor networks. Wireless Networks, 2002, vol. 8, no. 5, pp. 521–534. doi: 10.1023/a:1016598314198
17.  Du W., Deng J., Han Y.S., Varshney P.K., Katz J., Khalili A. A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions on Information and System Security, 2005, vol. 8, no. 2, pp. 228–258. doi: 10.1145/1065545.1065548
18.  Zhu S., Setia S., Jajodia S. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks, 2006. vol. 2, no. 4, pp. 500–528. doi: 10.1145/1218556.1218559
19.  Zimmermann P. Why I wrote PGP. Part of the Original PGP User's Guide, 1991.
20.  Zhou L., Haas Z.J.Securing ad hoc networks. IEEE Network, 1999, vol. 13, no. 6, pp. 24–30. doi: 10.1109/65.806983
21.  Bezzateev S.V., Stepanov M.V. Sets, free of coatings, constructed using elliptic codes. Nauchnyi Vestnik Noril'skogo Industrial'nogo Instituta, 2007, no. 1, pp. 74–75.(In Russian).
22.  Bezzateev S., Stepanov M. Algebraic-geometry codes on Griesmer bound. Proc. of Algebraic and Combinatorial Coding Theory, ACCT-10. Zvenigorod, Russia, 2006, pp. 256–258.
23.  Du X., Wang Y., Ge J., Wang Y. An ID-based broadcast encryption scheme for key distribution. IEEE Transactions on Broadcasting, 2005, vol. 51, no. 2, pp. 264–266. doi: 10.1109/tbc.2005.847600
24.  Chiou G.-H., Chen W.-T. Secure broadcasting using the secure lock. IEEE Transactions on Software Engineering, 1989, vol. 15, no. 8, pp. 929–934. doi: 10.1109/32.31350
25.  Jakobsen T., Knudsen L.R.The interpolation attack on block ciphers. Lecture Notes in Computer Science, 1997, pp. 28–40. doi: 10.1007/bfb0052332
26.  McEliece R.J., Sarwate D.V.On sharing secrets and reed-solomon codes. Communications of the ACM, 1981, vol. 24, no. 9, pp. 583–584. doi: 10.1145/358746.358762
27.  Man C.W.,Safavi-Naini R. Democratic key escrow scheme. Lecture Notes in Computer Science, 1997, vol. 1270, pp. 249–260. doi: 10.1007/bfb0027932
28.  Yuan J., Ding C.Secret sharing schemes from three classes of linear codes. IEEE Transactions on Information Theory, 2006, vol. 52, no. 1, pp. 206–212. doi: 10.1109/tit.2005.860412
29.  Massey J.L.Minimal codewords and secret sharing. Proc. 6th Joint Swedish-Russian International Workshop on Information Theory. Citeseer, 1993, pp. 276–279.
30.  Lee K.H., Jung T., Krouk E., Bezzateev S., Linsky E. Weighted Secret Sharing and Reconstructing Method. Patent US 7551740, 2009.
31.  Denning D.E.A lattice model of secure information flow. Communications of the ACM, 1976, vol. 19, no. 5, pp. 236–243. doi: 10.1145/360051.360056
32.  McEliece R. A public-key cryptosystem based on algebraic coding theory. DSN Progress Report, 1978, pp. 42–44.
33.  Westfeld A. F5—A steganographic algorithm. Lecture Notes in Computer Science, 2001, pp. 289–302. doi: 10.1007/3-540-45496-9_21
34.  Bezzateev S., Voloshina N., Zhidanov K. Multi-level significant bit (MLSB) embedding based on weighted container model and weighted F5 concept. Proc. 2nd Int. Afro-European Conference for Industrial Advancement AECIA, 2015, pp. 293–303. doi: 10.1007/978-3-319-29504-6_29
35.  Bezzateev S., Voloshina N. The digital fingerprinting method for state images based on weighted Hamming metric and on weighted container model. Journal of Computer and Communications, 2014, vol. 2, no. 9, pp. 121–126. doi: 10.4236/jcc.2014.29016
36.  Voloshina N., Zhidanov K., Bezzateev S. Optimal weighted watermarking for still images. Proc. XIV Int. Symposium on Problems of Redundancy in Information and Control Systems. St. Petersburg, 2014, pp. 98–102.
37.  Ometov A., Olshannikova E., Masek P., Olsson T., Hosek J., Andreev S., Koucheryavy Y. Dynamic trust associations over socially-aware D2D technology: a practical implementation perspective. IEEE Access, 2016, vol. 4, pp. 7692–7702. doi: 10.1109/access.2016.2617207
38.  Brockmann D., Hufnagel L., Geisel T. The scaling laws of human travel. Nature, 2006, vol. 439, no. 7075, pp. 462–467. doi: 10.1038/nature04292
Rhee I., Shin M., Hong S., Lee K., Kim S.J., Chong S. On the Levy-walk nature of human mobility. Proc. IEEE INFOCOM 2008 - The 27th Conference on Computer Communications, 2011,vol. 19, no. 3, pp. 30–43. doi: 10.1109/infocom.2008.145
  Fig. 1. Secure data transfer in the presence/absence of Public Key Infrastructure: PKi, PKn arethe public keys, IDis the unique device identifier, i, n – the sequence numbers of the device
 Fig. 2. The distribution of keys, where MK is the master key, and J is the ordinal number of the new device
 Fig. 3. Trust policy based on Pretty Good Privacy: Wij is the trust level between nodesi andj
 Fig. 4. Cover-Free Family for r = 2, n = 5
 Fig. 5. Examples of key distribution schemes (a–d)
 Fig. 6. An example of individual user movement in the system
 Fig. 7. The dependence of delay on the user’s speed 
 Fig. 8. The dependence of the throughput on the user’s speed

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Copyright 2001-2024 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.