Document Analysis of Efficient Group Key Management using D2D Communication
The availability of smartphones and tablet subscribers has brought improvements in wireless cellular networks through Device-to-Device (D2D) communications. However, addressing security challenges in D2D communication is still a research problem, especially, the Data Transformation Phenomenon (DTP) which affects the performance of Group Key Management (GKM) In this paper, we present a document analysis of the main factors required for efficient group key management, and proposal a scenario based approach for finding appropriate solution which uses a D2D communication in GKM to improve the DTP by presenting a light, secure and resilient environment.
How to cite this article:
Okike EU, Ratlhako E. Document Analysis of Efficient Group Key Management using D2D Communication. J Engr Desg Anal 2020; 3(2): 72-77.
Wang J, Li c, Wu j. Physical LAYER security of D2D communications under layer cellar networks. Applied Mechanics and Materials 2014; 441: 951-954.
Zhu D, Swindlehurst AL, Fakoorian SA et al. Device-to-Device communications: the physical layer security advantage. In IEEE ICASSP, 2014.
Harsha ES, Tirupa T. Advanced cellular networks for D2D communications. International Journal of Scientific Engineering and Technology Research 2014; 3(18): 2014.
Asadi A, Wang Q, Mancuso V. A Survey on Device-to-Device Communication in Cellular. Networks arXiv: 1310.0720v6[cs. GT]. 2014.
Tsolkas D, Liotou E, Passas N et al. LTE-A Access, Core and Protocol Architecture for D2D communication. Springer International Publishing Switzerland 2014.
Lin Z, Gao Z, Huang L et al. Hybrid Architecture Performance Analysis for Device-to-Device Communication in 5G cellular Network. @ Spriger Science+Business Media New York 2015.
Mingjun W, Zheng Y. Security in D2D Communication. Xidian University, Xi’an, China 2015.
3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Proximity-based services (ProSe); Stage 2 (Rel 12) 3GPP TS 23.303 V12.0.0 2014-12.
Fodor G, Parkvall S, Sorrentino S et al. Device-to-Device communication for national security. Institut Mines telecom RST Department Saclay, France 2015.
Arash A, Qing W, Mancuso V. Device-to-Device Communication in Cellular networks. IEEE communication survey and tutorials 2014; 16(4): 1801-1819.
Copyright (c) 2021 Journal of Engineering Design and Analysis
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
We, the undersigned, give an undertaking to the following effect with regard to our article entitled
________________________________________________________________________________” submitted for publication in (Journal title)________________________________________________ _______________________________________________________Vol.________, Year _________:-
1. The article mentioned above has not been published or submitted to or accepted for publication in any form, in any other journal.
2. We also vouchsafe that the authorship of this article will not be contested by anyone whose name(s) is/are not listed by us here.
3. I/We declare that I/We contributed significantly towards the research study i.e., (a) conception, design and/or analysis and interpretation of data and to (b) drafting the article or revising it critically for important intellectual content and on (c) final approval of the version to be published.
4. I/We hereby acknowledge ADRs conflict of interest policy requirement to scrupulously avoid direct and indirect conflicts of interest and, accordingly, hereby agree to promptly inform the editor or editor's designee of any business, commercial, or other proprietary support, relationships, or interests that I/We may have which relate directly or indirectly to the subject of the work.
5. I/We also agree to the authorship of the article in the following sequence:-
Authors' Names (in sequence) Signature of Authors
1. _____________________________________ _____________________________________
2. _____________________________________ _____________________________________
3. _____________________________________ _____________________________________
4. _____________________________________ _____________________________________
5. _____________________________________ _____________________________________
6. _____________________________________ _____________________________________
7. _____________________________________ _____________________________________
8. _____________________________________ _____________________________________
(I). All the authors are required to sign independently in this form in the sequence given above. In case an author has left the institution/ country and whose whereabouts are not known, the senior author may sign on his/ her behalf taking the responsibility.
(ii). No addition/ deletion/ or any change in the sequence of the authorship will be permissible at a later stage, without valid reasons and permission of the Editor.
(iii). If the authorship is contested at any stage, the article will be either returned or will not be
processed for publication till the issue is solved.