GET THE APP

Enhancing Trust and Security in D2D Communications: A Multi-level Approach
..

International Journal of Sensor Networks and Data Communications

ISSN: 2090-4886

Open Access

Mini Review - (2024) Volume 13, Issue 2

Enhancing Trust and Security in D2D Communications: A Multi-level Approach

Pandiya Raj*
*Correspondence: Pandiya Raj, Department of Mechanical, Electronics and Chemical Engineering, Oslo Metropolitan University, Oslo, Norway, Email:
Department of Mechanical, Electronics and Chemical Engineering, Oslo Metropolitan University, Oslo, Norway

Received: 01-Mar-2024, Manuscript No. sndc-24-127125; Editor assigned: 02-Mar-2024, Pre QC No. P-127125; Reviewed: 16-Mar-2024, QC No. Q-127125; Revised: 23-Mar-2024, Manuscript No. R-127125; Published: 30-Mar-2024 , DOI: 10.37421/2090-4886.2024.13.259
Citation: Raj, Pandiya. “Enhancing Trust and Security in D2D Communications: A Multi-level Approach.” Int J Sens Netw Data Commun 13 (2024): 259.
Copyright: © 2024 Raj P. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Abstract

Device-to-Device (D2D) communication is integral to modern wireless networks, facilitating direct communication between proximate devices without relying on base stations. Yet, securing and ensuring the trustworthiness of D2D communication presents substantial challenges. In this mini review, we delve into recent progress in securing D2D communications, focusing on approaches such as leveraging multiple trust levels, implementing adaptable data access controls, deploying resilient trust evaluation methods, and assessing performance through security proofs, analysis, and simulations.

Keywords

D2D Communications • wireless networks • Multiple Trust Levels

Introduction

Device-to-Device (D2D) communications play a crucial role in modern wireless networks, enabling direct communication between nearby devices without routing through base stations. However, ensuring the security and trustworthiness of D2D communication poses significant challenges. In this mini review article, we examine recent advancements in securing D2D communications based on multiple trust levels, implementing flexible data access control, employing robust trust evaluation methods, and evaluating performance through security proofs, analysis, and simulations [1].

Literature Review

One approach to enhance security in D2D communications is by implementing a scheme based on multiple trust levels. This scheme categorizes devices into different trust levels based on their historical behavior, reputation, and authentication credentials. By assigning trust levels to devices, the communication system can enforce stricter security measures for untrusted or malicious devices while allowing more lenient access for trusted entities. Such a system helps mitigate the risks associated with unauthorized access and malicious activities in D2D networks [2].

Flexible data access control mechanisms are essential for accommodating various D2D communication scenarios. These mechanisms enable dynamic adjustment of access permissions based on contextual factors such as device proximity, user preferences, and network conditions. By allowing fine-grained control over data access, D2D communication systems can effectively balance security requirements with usability and convenience. Flexible access control ensures that sensitive information is safeguarded while facilitating efficient communication among trusted devices [3].

Discussion

A robust trust evaluation method is crucial for assessing the reliability and trustworthiness of D2D communication participants. This method involves analyzing diverse factors such as communication behavior, reputation feedback from other devices, and cryptographic verification of identities. By continuously evaluating trust levels, the system can dynamically adapt security measures to mitigate emerging threats and vulnerabilities. Robust trust evaluation enhances the resilience of D2D networks against malicious actors and promotes trustworthy interactions among devices [4].

Evaluating the performance of D2D communication security mechanisms is essential to validate their effectiveness and identify potential weaknesses. This evaluation process involves rigorous security proofs, analytical modeling, and simulation-based experiments. By subjecting the security mechanisms to various scenarios and attack scenarios, researchers can assess their resilience and scalability. Performance evaluation provides valuable insights into the strengths and limitations of security solutions, guiding further refinements and optimizations [5,6].

Conclusion

In conclusion, securing D2D communications requires a multifaceted approach encompassing multiple trust levels, flexible data access control, robust trust evaluation methods, and comprehensive performance evaluation. By integrating these elements into D2D communication frameworks, researchers and practitioners can enhance the security, reliability, and trustworthiness of wireless communication networks. Continued research and innovation in this area are essential to address emerging security challenges and ensure the seamless integration of D2D communications into future wireless systems.

Acknowledgement

None.

Conflict of Interest

None.

References

  1. Chen, Xinlei, Yulei Zhao, Yong Li and Xu Chen, et al. "Social trust aided D2D communications: Performance bound and implementation mechanism." IEEE J Sel Areas Commun 36 (2018): 1593-1608.
  2. Google Scholar, Crossref, Indexed at

  3. Suraci, Chiara, Sara Pizzi, David Garompolo and Giuseppe Araniti, et al. "Trusted and secured D2D-aided communications in 5G networks." Ad Hoc Netw 114 (2021): 102403.
  4. Google Scholar, Crossref, Indexed at

  5. Haus, Michael, Muhammad Waqas, Aaron Yi Ding and Yong Li, et al. "Security and privacy in device-to-device (D2D) communication: A review." IEEE Commun Surv Tutor 19 (2017): 1054-1079.
  6. Google Scholar, Crossref, Indexed at

  7. Shi, Xin, Dan Wu, Cheng Wan and Meng Wang, et al. "Trust evaluation and covert communication-based secure content delivery for D2D networks: A hierarchical matching approach." IEEE Access 7 (2019): 134838-134853.
  8. Google Scholar, Crossref, Indexed at

  9. Wang, Mingjun and Zheng Yan. "A survey on security in D2D communications." Mob Netw Appl 22 (2017): 195-208.
  10. Google Scholar, Crossref, Indexed at

  11. Zhang, Zhaoyue, Xinghao Guo and Yun Lin. "Trust management method of D2D communication based on RF fingerprint identification." IEEE Access 6 (2018): 66082-66087.
  12. Google Scholar, Crossref, Indexed at

Google Scholar citation report
Citations: 343

International Journal of Sensor Networks and Data Communications received 343 citations as per Google Scholar report

International Journal of Sensor Networks and Data Communications peer review process verified at publons

Indexed In

 
arrow_upward arrow_upward