Font Size: a A A

Research On Privacy And Security Of D2D Communication

Posted on:2019-01-15Degree:MasterType:Thesis
Country:ChinaCandidate:Y N ZhangFull Text:PDF
GTID:2348330542487607Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Device to device(D2D)communication is the key technology of 5G.Once the communication link has been established,the data can be transmitted directly among devices without forwarding by the core device or the intermediate device,which reduces the data pressure on the core network of the communication system and improves spectrum utilization and network capacity expansion greatly.However,D2D communication has some safety issues,such as counterfeiting communication entities and leaking real identities.Therefore,the security and privacy of D2D communication is one of the hot research topics at present.This thesis mainly introduces the basic knowledge of D2D communication technology,lists the application scenarios of D2D,points out the existing security problems and solutions of D2D communication,and focus on the security of D2D key agreement and D2D multi-hop data sharing communication.The main contents of the thesis are as follows:(1)Propose a new D2D key agreement protocol.Firstly,the existing key agreement protocols are introduced and the challenges of the existing protocols in the D2D communication scenario are analyzed.Then we list four detailed steps of the proposed protocol.Finally,the security,feasibility and computation of the proposed protocol are analyzed.The results show that the protocol meets the security requirements of D2D and it is feasible under practical conditions.Compared with other protocols,it has a lower computational complexity.(2)Propose a certificateless generalized signcryption algorithm.In view of the limited computational ability of D2D devices and the large computation of existing signcryption algorithms,an improved signcryption algorithm is given.The random oracle model shows that the protocol is secure.Compared with the existing signcryption algorithms,the algorithm computational cost is lower.(3)Propose a new D2D secure data sharing protocol.Based on the proposed certificateless signcryption algorithm and the characteristics of D2D communication,our protocol share the data without forwarding by the base station.Then the non-formal analysis,quantitative analysis and formula derivation are used to analyze the security,computational complexity and availability of the protocol.The results show that the protocol meets the security requirements of the system and the computational efficiency is superior to other protocols.By selecting the number of proxy SPs reasonably,the system is also available when the number of user requests increases.At the end of the thesis,the research results are summarized and the future research directions are prospected.
Keywords/Search Tags:D2D communication, security, key agreement, certificateless generalized signcryption, queuing theory
PDF Full Text Request
Related items