2015 International Wireless Communications and Mobile Computing Conference (IWCMC) 2015
DOI: 10.1109/iwcmc.2015.7289154
|View full text |Cite
|
Sign up to set email alerts
|

Fast group discovery and non-repudiation in D2D communications using IBE

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(13 citation statements)
references
References 6 publications
0
13
0
Order By: Relevance
“…The proposed solution was analyzed in depth and simulated with detailcomparison with existing approaches that focus on near field communication similar D2D (i.e. ad-hoc) [11]. Furthermore, the simulation results prove that the Group Key Management (GKM) concept is an efficient key management system for D2D communication.…”
Section: Introductionmentioning
confidence: 94%
“…The proposed solution was analyzed in depth and simulated with detailcomparison with existing approaches that focus on near field communication similar D2D (i.e. ad-hoc) [11]. Furthermore, the simulation results prove that the Group Key Management (GKM) concept is an efficient key management system for D2D communication.…”
Section: Introductionmentioning
confidence: 94%
“…The main points to be considered in non-repudiation are 1) whether it is a proper message content, 2) whether the message is from proper origin, 3) whether the proof of message by recipient is included and 4) whether acknowledgement of message by the recipient is included. There are only few articles related to this topic in OMSN like [29], [30]. Therefore, this is also a main research challenge which is to be considered by the researches in their future works.…”
Section: Issn: 2088-8708 mentioning
confidence: 99%
“…In this layer, a key management scheme is considered as the foundation of any solution based on cryptography. Various solutions have been proposed in the literature [9, 13, 14, 18, 31, 33–37] (Table 1).…”
Section: Taxonomy Of D2d Security Solutionsmentioning
confidence: 99%
“…Recently, Abd‐Elrahman et al . [31] proposed a solution based on the identity‐based encryption (IBE) and elliptic curve cryptography (ECC) mechanisms for key generation to secure exchanged messages during the discovery and communication phases. The proposed solution is discussed under two D2D use cases (single operator and multi‐operators) and is further used to introduce an efficient key management system for group communication.…”
Section: Taxonomy Of D2d Security Solutionsmentioning
confidence: 99%
See 1 more Smart Citation