References
- U. N. Kar and D. K. Sanyal, "A critical review of 3gpp standardization of device-to-device communication in cellular networks," SN Computer Science, vol. 1, no. 1,p. 37, 2020. https://doi.org/10.1007/s42979-019-0045-5
- U. N. Kar and D. K. Sanyal, "An overview of device-to-device communication in cellular networks", ICT Express, volume 4, issue 4, December 2018, pages 203-208. https://doi.org/10.1016/j.icte.2017.08.002
- M. Wazid, A. K. Das, N. Kumar, and A. V. Vasilakos, "Design of secure key management and user authentication scheme for fog computing services," Future Generation Computer Systems, vol. 91, pp. 475-492,2019. https://doi.org/10.1016/j.future.2018.09.017
- A. P. G Lopes and P. R. Gondim, "Mutual authentication protocol for d2d communications in a cloud-based e-health system," Sensors, vol. 20, no. 7, p. 2072, 2020. https://doi.org/10.3390/s20072072
- G. S. Gaba, G. Kumar, T.-H. Kim, H. Monga, and P. Kumar, "Secure device-to-device communications for 5g enabled internet of things applications," Computer Communications, vol. 169, pp. 114-128, 2021. https://doi.org/10.1016/j.comcom.2021.01.010
- P. Gandotra, R. K. Jha, and S. Jain, "A survey on device-to-device (d2d) communication: Architecture and security issues," Journal of Network and Computer Applications, vol. 78, pp. 9-29, 2017. https://doi.org/10.1016/j.jnca.2016.11.002
- M. Haus, M. Waqas, A. Y. Ding, Y. Li, S. Tarkoma, and J. Ott, "Security and privacy in device-to-device (d2d) communication: A review," IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 1054-1079, 2017. https://doi.org/10.1109/COMST.2017.2649687
- F. Jameel, Z. Hamid, F. Jabeen, S. Zeadally, and M. A. Javed, "A survey of device-to-device communications: Research issues and challenges," IEEE Communications Surveys & Tutorials, vol. 20, no. 3, pp. 2133- 2168, 2018. https://doi.org/10.1109/COMST.2018.2828120
- J. Wang, Y. Huang, S. Jin, R. Schober, X. You, and C. Zhao, "Resource management for device-to-device communication: A physical layer security perspective," IEEE Journal on Selected Areas in Communications, vol. 36, no. 4, pp. 946-960, 2018. https://doi.org/10.1109/jsac.2018.2825484
- A. Khan, Y. Javed, J. Abdullah, J. Nazim, and N. Khan, "Security issues in 5g device to device communication," IJCSNS, vol. 17, no. 5, p. 366, 2017.
- S. T. Shah, S. F. Hasan, B.-C. Seet, P. H. J. Chong, and M. Y. Chung, "Device-to-device communications: A contemporary survey," Wireless Personal Communications, vol. 98, no. 1, pp. 1247-1284, 2018. https://doi.org/10.1007/s11277-017-4918-4
- O. N. Hamoud, T. Kenaza, and Y. Challal, "Security in device-to-device communications: a survey," IET Networks, vol. 7, no. 1, pp. 14-22, 2017. https://doi.org/10.1049/iet-net.2017.0119
- Y. Zhang, K. Cheng, F. Khan, R. Alturki, R. Khan, and A. U. Rehman, "A mutual authentication scheme for establishing secure device-to-device communication sessions in the edge-enabled smart cities," Journal of Information Security and Applications, vol. 58, p. 102683, 2021. https://doi.org/10.1016/j.jisa.2020.102683
- J. Kim and J. Song, "A secure device-to-device link establishment scheme for lorawan," IEEE Sensors Journal, vol. 18, no. 5, pp. 2153- 2160, 2018. https://doi.org/10.1109/jsen.2017.2789121
- M. Waqas, M. Ahmed, Y. Li, D. Jin, and S. Chen, "Social-aware secret key generation for secure device-to-device communication via trusted and non-trusted relays," IEEE Transactions on Wireless Communications, vol. 17, no. 6, pp. 3918-3930, 2018. https://doi.org/10.1109/twc.2018.2817607
- R. Amin, S. H. Islam, P. Vijayakumar, M. K. Khan, and V. Chang, "A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication," Multimedia Tools and Applications, vol. 77, no. 9, pp. 11 041-11 066, 2018. https://doi.org/10.1007/s11042-017-4996-z
- S. Jegadeesan, M. Azees, P. M. Kumar, G. Manogaran, N. Chilamkurti, R. Varatharajan, and C.-H. Hsu, "An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications," Sustainable Cities and Society, vol. 49, p. 101522, 2019. https://doi.org/10.1016/j.scs.2019.101522
- V. Kumar, M. Ahmad, and A. Kumari, "A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted tmis," Telematics and Informatics, vol. 38, pp. 100-117, 2019. https://doi.org/10.1016/j.tele.2018.09.001
- M. S. Raniyal, I. Woungang, S. K. Dhurandher, and S. S. Ahmed, "Passphrase protected device-to-device mutual authentication schemes for smart homes," Security and Privacy, vol. 1, no. 3, p. e42, 2018. https://doi.org/10.1002/spy2.42
- L. Wu, J. Wang, K.-K. R. Choo, and D. He, "Secure key agreement and key protection for mobile device user authentication," IEEE Transactions on Information Forensics and Security, vol. 14, no. 2, pp. 319-330, 2018. https://doi.org/10.1109/tifs.2018.2850299
- M. Wang, Z. Yan, and V. Niemi, "Uaka-d2d: Universal authentication and key agreement protocol in d2d communications," Mobile Networks and Applications, vol. 22, no. 3, pp. 510-525, 2017. https://doi.org/10.1007/s11036-017-0870-5