Enabling Trustworthy Multicast Wireless Services through D2D Communications in 5G Networks
Sara Pizzi,
Chiara Suraci,
Leonardo Militano,
Antonino Orsino,
Antonella Molinaro,
Antonio Iera and
Giuseppe Araniti
Additional contact information
Sara Pizzi: DIIES, University “Mediterranea” of Reggio Calabria, Via Graziella, Loc. Feo di Vito, 89100 Reggio Calabria, Italy
Chiara Suraci: DIIES, University “Mediterranea” of Reggio Calabria, Via Graziella, Loc. Feo di Vito, 89100 Reggio Calabria, Italy
Leonardo Militano: DIIES, University “Mediterranea” of Reggio Calabria, Via Graziella, Loc. Feo di Vito, 89100 Reggio Calabria, Italy
Antonino Orsino: Ericsson Research, Hirsalantie 11, 02420 Jorvas, Finland
Antonella Molinaro: DIIES, University “Mediterranea” of Reggio Calabria, Via Graziella, Loc. Feo di Vito, 89100 Reggio Calabria, Italy
Antonio Iera: DIIES, University “Mediterranea” of Reggio Calabria, Via Graziella, Loc. Feo di Vito, 89100 Reggio Calabria, Italy
Giuseppe Araniti: DIIES, University “Mediterranea” of Reggio Calabria, Via Graziella, Loc. Feo di Vito, 89100 Reggio Calabria, Italy
Future Internet, 2018, vol. 10, issue 7, 1-15
Abstract:
Device-to-device (D2D) communication is considered as one of the key enabling technologies for fifth-generation (5G) networks as it allows data offloading generated by the huge number of connected devices. In this respect, group-oriented services are among the most interesting usage scenarios. Indeed, D2D can improve the performance of the conventional multicast scheme (CMS) in cellular networks, which is known to suffer from low spectral efficiency. Security is a further key field of investigation for 5G systems, as any threat to privacy and security may lead to both deteriorated user experience and inefficient network resources’ utilization. Security issues are even more in focus for D2D connections between devices that are in mutual proximity. To improve the CMS performance and also sustain security requirements of the 5G network, this work proposes a secure D2D data transmission algorithm. Making use of mechanisms such as encryption and signature, this algorithm aims to protect the exchanged data and the privacy of the devices involved in the communication. A simulation campaign conducted using MATLAB shows the ability of the proposed solution to take advantage of the establishment of secure D2D communications and efficiently utilize network resources.
Keywords: device-to-device (D2D) communication; 5G networks; security; multicasting (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2018
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/1999-5903/10/7/66/pdf (application/pdf)
https://www.mdpi.com/1999-5903/10/7/66/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:10:y:2018:i:7:p:66-:d:157332
Access Statistics for this article
Future Internet is currently edited by Ms. Grace You
More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().