完整後設資料紀錄
DC 欄位語言
dc.contributor.authorHsu, Ruei-Hauen_US
dc.contributor.authorLee, Jeminen_US
dc.contributor.authorQuek, Tony Q. S.en_US
dc.contributor.authorChen, Jyh-Chengen_US
dc.date.accessioned2018-08-21T05:53:03Z-
dc.date.available2018-08-21T05:53:03Z-
dc.date.issued2018-02-01en_US
dc.identifier.issn1556-6013en_US
dc.identifier.urihttp://dx.doi.org/10.1109/TIFS.2017.2756567en_US
dc.identifier.urihttp://hdl.handle.net/11536/144221-
dc.description.abstractDevice-to-device (D2D) communication is mainly launched by the transmission requirements between devices for specific applications such as proximity services in long-term evolution advanced networks, and each application will form a group of registered devices for the network-covered and network-absent D2D communications. During the applications of D2D communication, each device needs to identify the other devices of the same group in proximity by their group identity. This leads to the exposure of group information, by which the usage of applications can be analyzed by eavesdroppers. Hence, this paper introduces network-covered and network-absent authenticated key exchange protocols for D2D communications to guarantee accountable group anonymity, end-to-end security to network operators, as well as traceability and revocability for accounting and management requirements. We formally prove the security of those protocols, and also develop an analytic model to evaluate the quality of authentication protocols by authentication success rate in D2D communications. Besides, we implement the proposed protocols on android mobile devices to evaluate the computation costs of the protocols. We also evaluate the authentication success rate by the proposed analytic model and prove the correctness of the analytic model via simulation. Those evaluations show that the proposed protocols are feasible to the performance requirements of D2D communications.en_US
dc.language.isoen_USen_US
dc.subjectD2D communicationen_US
dc.subjectproximity serviceen_US
dc.subjectgroup anonymityen_US
dc.subjectmutual authenticationen_US
dc.subjectend-to-end securityen_US
dc.titleGRAAD: Group Anonymous and Accountable D2D Communication in Mobile Networksen_US
dc.typeArticleen_US
dc.identifier.doi10.1109/TIFS.2017.2756567en_US
dc.identifier.journalIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITYen_US
dc.citation.volume13en_US
dc.citation.spage449en_US
dc.citation.epage464en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000417894200015en_US
顯示於類別:期刊論文