Font Size: a A A

Research On The Secure Data Sharing Scheme In D2D Communications

Posted on:2019-10-01Degree:MasterType:Thesis
Country:ChinaCandidate:Z L LiFull Text:PDF
GTID:2428330566495906Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
D2D communication technology is a direct communication between devices under the control of a base station.Due to the short communication distance,direct device communication,and multiplexed cell resources,data transmission between users does not need to go through the base station.Therefore,D2 D communication technology can improve spectrum utilization,reduce the burden on the base station,and improve the user experience.However,the rapid development of mobile communication technologies and computer network technologies has led to a richer variety of communication services.In addition to the use of traditional voice services,various types of application programs expose user data to wireless communication channels.Therefore,the security problems brought about by the booming business of mobile communications have attracted the attention of researchers and have also become a constraint factor in the continued development of various businesses.How to ensure that the user's communication data is not eavesdropped,to prevent privacy leakage,to ensure the confidentiality,integrity and non-repudiation of data transmission is one of the important research contents in current D2 D communication.Therefore,based on mathematical theory problems and cryptography theory,this paper combines the characteristics of D2 D communication,starting from the design of authentication key agreement protocol and the design of D2 D user data security sharing scheme to study the security of D2 D communication.The specific research content is as follows:(1)Firstly,the research status of D2 D communication security is introduced.It is pointed out that the current research on D2 D communication security mainly focuses on the physical layer,while the research on D2 D application layer security is rare at present.Then,some design schemes of authentication key agreement in current D2 D communication are introduced,and the deficiencies in these schemes are pointed out.Finally,combining the current D2 D communication technology characteristics,it points out the application layer security requirements of D2 D communication and introduces the research direction of this paper.(2)Secondly,in order to meet the security requirements of the authentication key agreement protocol in D2 D communication,taking into account the constraints between the user terminal's identity authentication and the key negotiation's security issues and computing power,an elliptic curve-based algorithm is proposed.Logarithmic problem D2 D user fast authentication key agreement protocol.The protocol comprehensively analyzes the security and computational complexity of the user registration and authentication key negotiation phase,and assigns unique identification identifiers to users during the registration phase based on the ECDLP challenge.By increasing the amount of computation for the server in the user registration phase,the amount of calculations in the authentication key negotiation phase can be effectively reduced,and at the same time the communication security requirements can be ensured,and the efficiency of user authentication key negotiation can be improved.(3)Finally,in the mobile social network application scenario,a D2 D data security sharing scheme based on the user's social network attributes is designed.The program first considers the user's configuration attributes and interaction characteristics on the social network,such as the user's geographic location,personal preferences,and online interactions.The degree of trust can ensure that when a D2 D user is detected,a target user having a stronger trust relationship with the requesting user is obtained,thereby preventing illegal users from responding to user requests and performing communication.In addition,in order to ensure that the user's personal preferences and other privacy information are not stolen,this article uses homomorphic encryption algorithm to encrypt the user's personal hobby information.The D2 D user data security sharing scheme designed in this paper uses digital signature algorithm and data encryption algorithm to ensure the authenticity,confidentiality and integrity of authentication messages and data messages in the transmission process.
Keywords/Search Tags:Device-to-Device Secure Communication, Cryptography Theory, Authenticated Key Agreement, Mobile Social Network
PDF Full Text Request
Related items