Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-mlc7c Total loading time: 0 Render date: 2024-11-13T01:06:40.910Z Has data issue: false hasContentIssue false

8 - Security for D2D communications

from Part III - Resource management, cross-layer design, and security for D2D communications

Published online by Cambridge University Press:  05 March 2015

Lingyang Song
Affiliation:
Peking University, Beijing
Dusit Niyato
Affiliation:
Nanyang Technological University, Singapore
Zhu Han
Affiliation:
University of Houston
Ekram Hossain
Affiliation:
University of Manitoba, Canada
Get access

Summary

D2D communications can be prone to potential security threats. For example, D2D mobiles need to know who else is located nearby so as to pair up. If the location information is spoofed, the interference caused by wrongly paired D2D users can significantly lower the system performance. Additionally, D2D communications between neighboring D2D nodes provide alternative security approaches (physical-layer security) by using channel statistics. In this chapter, we will study the following two security problems in detail.

  1. • Location security: D2D networks need to pair D2D users on the basis of location information so as to use locally available spectrum. This creates a critical loophole for global-positioning-system (GPS)-spoofing attack, where the adversary attacks the GPS signals received by D2D devices, so that D2D devices obtain false available spectrum information with false location information. This security loophole can potentially result in large-scale malfunctioning of mobile D2D networks.

  2. • Data transmission security: Security in D2D communications is traditionally implemented using cryptography, as in other wireless communication systems. Alternatively, physical-layer security provides additional security provided by the channel statistics, which fits well the D2D communications scenarios. We will consider physical-layer security in D2D communications as an underlay to cellular networks with an eavesdropper. Benefiting from the underlaid spectrum reuse, D2D users can contribute to the system's secrecy capacity, while D2D users may interfere with cellular users and decrease their secrecy capacity.

Location security

8.1.1 Problem overview

Dynamic-spectrum-access (DSA) technology has received much attention in industry and academic environments due to its promise of better utilization of spectrum resources compared with the current static spectrum-allocation method. Traditionally, spectrum allocation is static, where FCC assigns communities licenses to use specific frequencies, such as AM, FM, short-wave and citizens' bands, and VHF and UHF television channels, as well as hundreds of less familiar bands that serve cellular and cordless telephones, GPS trackers, air-traffic-control radars, security alarms, radio-controlled toys, and the like. While some of these assigned spectrum bands have been overloaded due to the growth of their users, other spectrum bands are scarcely used.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×