Abstract

Device to Device (D2D) communications is a candidate technology for the fifth-generation (5G) and beyond mobile networks and certainly that results in high throughput, less energy consumption, reduce delay, and data traffic offload. Proximity services are the key enablers of D2D communications. A D2D technology boosts the performance and capacity of a conventional cellular system through the proximity services. To initiate the proximity services, Device Discovery (DD) is one of the the primary tasks. A DD makes the decision for effective D2D communications in terms of accuracy, speed, and minimum energy consumption. To discover the neighbor devices, the discovery signal is transmitted directly or through some access points. The discovery signal is affected by invaders during transmission which causes inaccuracy, energy consumption, and latency. Therefore, security and privacy issues must be addressed, especially in discovery signal transmission. In this paper, security and privacy issues in DD are highlighted. It is comprehensive and proves that in-band is much better than out-band with practical and technological reasons. To enhance the scope of the research, network level, and system level Security and Privacy (S&P) issues in the distributed and centralized systems environment with or without central management are surveyed. Along with an extensive survey is provided for the most recent work on DD concerning security and privacy issues, and comparison among in-band and out-band DD is performed. In the end, open issues are identified as future work on DD security and privacy in D2D communications. It is a novel survey in terms of security and privacy aspects of DD with possible suggested solutions for readers' motivation.

Highlights

  • A D2D network enhances the performance and capacity of the traditional cellular networks. These parameters are much depending on security and privacy concerns, if the security and privacy issues are not considered in all modes of phases for D2D discovery and resource allocation may cause inefficiency

  • The diversity of the D2D system is a significant bottleneck to building up a universal Security and Privacy (S&P) protocol good with all D2D layers like Device Discovery (DD) and resource allocation

  • An outline is given on DD S&P challenges, attacks on the D2D system, their classification and the related solutions

Read more

Summary

INTRODUCTION

Device to Device (D2D) communication enables direct communications among devices in distributed and network assisted fashion. Due to the densification of the cellular systems, jamming in ultra dense networks is posing serious threats to the authenticity, confidentiality, and integrity of discovery information exchange over direct connections. A D2D is a candidate technology for 5G for improving delay in communication, power reduction and development assorted additional applications and services All these applications and services are vulnerable to security and privacy and need attention. A D2D network enhances the performance and capacity of the traditional cellular networks These parameters are much depending on security and privacy concerns, if the security and privacy issues are not considered in all modes of phases for D2D discovery and resource allocation may cause inefficiency. F: DENIABILITY Being intelligent to probably repudiate a certain action, for example sending a signal

FUNDAMENTAL PLAYERS FOR DD
SECURITY EVOLUTION
ENCODING HOPPING DISTANCE
CHALLENGES AND OPPORTUNITIES
Findings
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.