1 |
P. Gandotra, R. K. Jha, and S. Jain, "A survey on device-to-device (d2d) communication: Architecture and security issues," Journal of Network and Computer Applications, vol. 78, pp. 9-29, 2017.
DOI
|
2 |
F. Jameel, Z. Hamid, F. Jabeen, S. Zeadally, and M. A. Javed, "A survey of device-to-device communications: Research issues and challenges," IEEE Communications Surveys & Tutorials, vol. 20, no. 3, pp. 2133- 2168, 2018.
DOI
|
3 |
J. Wang, Y. Huang, S. Jin, R. Schober, X. You, and C. Zhao, "Resource management for device-to-device communication: A physical layer security perspective," IEEE Journal on Selected Areas in Communications, vol. 36, no. 4, pp. 946-960, 2018.
DOI
|
4 |
A. Khan, Y. Javed, J. Abdullah, J. Nazim, and N. Khan, "Security issues in 5g device to device communication," IJCSNS, vol. 17, no. 5, p. 366, 2017.
|
5 |
S. T. Shah, S. F. Hasan, B.-C. Seet, P. H. J. Chong, and M. Y. Chung, "Device-to-device communications: A contemporary survey," Wireless Personal Communications, vol. 98, no. 1, pp. 1247-1284, 2018.
DOI
|
6 |
O. N. Hamoud, T. Kenaza, and Y. Challal, "Security in device-to-device communications: a survey," IET Networks, vol. 7, no. 1, pp. 14-22, 2017.
DOI
|
7 |
J. Kim and J. Song, "A secure device-to-device link establishment scheme for lorawan," IEEE Sensors Journal, vol. 18, no. 5, pp. 2153- 2160, 2018.
DOI
|
8 |
R. Amin, S. H. Islam, P. Vijayakumar, M. K. Khan, and V. Chang, "A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication," Multimedia Tools and Applications, vol. 77, no. 9, pp. 11 041-11 066, 2018.
DOI
|
9 |
U. N. Kar and D. K. Sanyal, "A critical review of 3gpp standardization of device-to-device communication in cellular networks," SN Computer Science, vol. 1, no. 1,p. 37, 2020.
DOI
|
10 |
M. S. Raniyal, I. Woungang, S. K. Dhurandher, and S. S. Ahmed, "Passphrase protected device-to-device mutual authentication schemes for smart homes," Security and Privacy, vol. 1, no. 3, p. e42, 2018.
DOI
|
11 |
U. N. Kar and D. K. Sanyal, "An overview of device-to-device communication in cellular networks", ICT Express, volume 4, issue 4, December 2018, pages 203-208.
DOI
|
12 |
M. Haus, M. Waqas, A. Y. Ding, Y. Li, S. Tarkoma, and J. Ott, "Security and privacy in device-to-device (d2d) communication: A review," IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 1054-1079, 2017.
DOI
|
13 |
M. Wazid, A. K. Das, N. Kumar, and A. V. Vasilakos, "Design of secure key management and user authentication scheme for fog computing services," Future Generation Computer Systems, vol. 91, pp. 475-492,2019.
DOI
|
14 |
A. P. G Lopes and P. R. Gondim, "Mutual authentication protocol for d2d communications in a cloud-based e-health system," Sensors, vol. 20, no. 7, p. 2072, 2020.
DOI
|
15 |
G. S. Gaba, G. Kumar, T.-H. Kim, H. Monga, and P. Kumar, "Secure device-to-device communications for 5g enabled internet of things applications," Computer Communications, vol. 169, pp. 114-128, 2021.
DOI
|
16 |
S. Jegadeesan, M. Azees, P. M. Kumar, G. Manogaran, N. Chilamkurti, R. Varatharajan, and C.-H. Hsu, "An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications," Sustainable Cities and Society, vol. 49, p. 101522, 2019.
DOI
|
17 |
V. Kumar, M. Ahmad, and A. Kumari, "A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted tmis," Telematics and Informatics, vol. 38, pp. 100-117, 2019.
DOI
|
18 |
L. Wu, J. Wang, K.-K. R. Choo, and D. He, "Secure key agreement and key protection for mobile device user authentication," IEEE Transactions on Information Forensics and Security, vol. 14, no. 2, pp. 319-330, 2018.
DOI
|
19 |
M. Waqas, M. Ahmed, Y. Li, D. Jin, and S. Chen, "Social-aware secret key generation for secure device-to-device communication via trusted and non-trusted relays," IEEE Transactions on Wireless Communications, vol. 17, no. 6, pp. 3918-3930, 2018.
DOI
|
20 |
M. Wang, Z. Yan, and V. Niemi, "Uaka-d2d: Universal authentication and key agreement protocol in d2d communications," Mobile Networks and Applications, vol. 22, no. 3, pp. 510-525, 2017.
DOI
|
21 |
Y. Zhang, K. Cheng, F. Khan, R. Alturki, R. Khan, and A. U. Rehman, "A mutual authentication scheme for establishing secure device-to-device communication sessions in the edge-enabled smart cities," Journal of Information Security and Applications, vol. 58, p. 102683, 2021.
DOI
|