Secure and Smart Media Sharing Based on a Novel Mobile Device
Download
Report
Transcript Secure and Smart Media Sharing Based on a Novel Mobile Device
SECURE AND SMART MEDIA SHARING BASED ON
A NOVEL MOBILE DEVICE-TO-DEVICE
COMMUNICATION FRAMEWORK WITH SECURITY
AND PROCEDURES
PREPARED BY: JEEVANDEEP SAMANTA, DEEPTHI GANGALA, IBRAHIM ALKHALIFA
AGENDA
Definition and Benefits of D2D Communications
Three Aspects for D2D Framework
History of Wireless Communications
Introduction of 3GPP and LTE-A
Classification of the D2D Services
Ad-hoc Type, Agent type and Mesh Type
Legacy LTE-A System
D2D Security Issues
D2D Communication Framework
Conclusion
https://www.qualcomm.com/invention/research/projects/lte-direct
DEFINITION AND BENEFITS
• Definition of Device-to-Device (D2D) Communications
• D2D communication enables two or more mobile devices in proximity of
each other to establish direct local links with any physical medium of their
choice, within an ad hoc network without the support of cellular network
or with assistance from cellular network to perform direct data transfer.
eNB
eNB
① Increase network capacity
② Extend coverage
③ Offload data
④ Improve energy efficiency
⑤ Create new applications
FUTURE CHALLENGES
1. Bandwidth and data traffic boost (Cisco)
Data traffic increases 2 times/per year, 1000 times by 2020
Wireless network cannot support that!
2. Information aggregate to hotspot and local area
70% in office and hotspot, over 90% in future
Hotspot cannot be guaranteed!
3. Increasing wide range of application with varying requirements
http://dx.doi.org/10.1145/2808062.2808071
A secure and smart D2D communication
framework answers the following challenges:
1. what will be the trending technology for overcoming
cellular network data traffic jamming?
2. How can we overcome security threats and high pricing
for data services?
3. How can users earn revenue by media sharing?
DEVICE-TO-DEVICE COMMUNICATIONS
• Peer-to-peer Communications (P2P)
• Cooperative Communications
• Cooperative Mobile as Relay
• Cooperative Diversity
eNB
THERE ASPECTS FOR D2D COMMUNICATION
FRAMEWORK
• Technology such as Bluetooth, Wireless Fidelity (WiFi) Direct
(WiFi-D), LTE-A Direct,
• Business Model such as schemes, pricing policies, and
revenue flows between Network Elements
• Security to be free from all possible vulnerabilities like
spoofing, tampering, repudiation, information disclosure and
denial of service
http://dx.doi.org/10.1145/2808062.2808071
HISTORY OF WIRELESS COMMUNICATIONS
http://wwwen.zte.com.cn/endata/magazine/ztetechnologies/2010/no2/articles/201002/t20100225_180761.html
D2D ROADMAP
Source:Intel
INTRODUCTION OF 3GPP AND LTE
• The 3GPP Long Term Evolution (LTE) represents a major
advance in cellular technology
Higher performance
Backwards compatible
Wide application
• Orthogonal Frequency Division Multiple Access (OFDMA) for
downlink data transmission
• Single carrier-FDMA for uplink transmission
http://www.3gpp.org/
CLASSIFICATION OF THE D2D SERVICES
• D2D network Assisted:
Here the network helps D2D communication by providing location information of
devices that are located within a proximity area to assist information of the D2D
cluster. It also provides radio resource management related information for D2D
communications such as available spectrum band, available frame resource
assignment, transmission and reception scheduling information and others.
1. AD-HOC TYPE
Data is saved from the network.
http://dx.doi.org/10.1145/2808062.2808071
2. AGENT TYPE
When several devices request for a same content, they form a cluster, and nominate
one UE as a D2DS Agent.Other UEs pay the Agent UE for content download, and share
data traffic cost among themselves.
http://dx.doi.org/10.1145/2808062.2808071
3. MESH TYPE
• All UEs form a cluster and request for a game Mobile Network distributes the game to
N users by sending 1/N part of content to each UE.
• Each UE then shares its 1/N part of data with other UEs. After receiving all the parts of
content, the UE combines it into one file, and then install the game.
• Here the data traffic cost is reduced as instead of downloading the entire content, each
UE just downloads a part of it.
http://dx.doi.org/10.1145/2808062.2808071
LEGACY LTE-A SYSTEM
http://dx.doi.org/10.1145/2808062.2808071
D2D SECURITY ISSUES
Fake D2D-S (advertisers) post advertisements which could lead legitimate recipients
facing high risk by sharing their user information when requesting for the content
download.
http://dx.doi.org/10.1145/2808062.2808071
SECOND THREAT
Fake D2D-R (recipients) send bulk download requests to legitimate advertisers, thereby
loading their device with numerous fake requests along with other vulnerable threats.
http://dx.doi.org/10.1145/2808062.2808071
MAN IN THE MIDDLE ATTACK
Legitimate advertisers and recipients been attacked by the Man-in-the-Middle (MITM)
who in turn eavesdrops the secured information or the content, and thereby gains by
cracking the same.
http://dx.doi.org/10.1145/2808062.2808071
STRIDE APPROACH
Thereby for each type of UE threats, a security property is identified using the STRIDE
approach of Microsoft.
http://dx.doi.org/10.1145/2808062.2808071
STRIDE THREATS AND SECURITY PROPERTY
• Data Flows: Control Signal Flow, Data Traffic Flow, Revenue Signal Flow
• Data Stores: Authorization, Authentication & Accounting (AAA) Server Database,
App Store Database
• Processes: UE Advertising, UE Download Request, D2D DataTransfer Between UEs,
User Authentication
• Interactors: Mobile Network, UE, Security/Billing Server, App Store, Content Provider.
http://dx.doi.org/10.1145/2808062.2808071
D2D COMMUNICATION FRAMEWORK
• D2D communication framework is built, by designing two web servers namely
App Store server and Operator Billing server.
• And built one Android Application Package file (APK) namely D2DFileTransfer
App.
• This D2DFileTransferApp works only for mobiles with WiFi-D functionality
which is a trending P2P technology..
CONT.
• The proposed D2D communication framework works as follows:
• UE1 holds the APK content, advertises for the same using
D2DFileTransferApp.
• The UE2 which also holds the D2DFileTransfer App and being in the proximity
discovery radius of D2D-S gets pairing request from D2D-S.
• Once the D2D-R accepts the request, D2D-S starts sending the APK file along
with user device info like Sender IMEI and File Name to D2D-R.
• Once sender receives the file, the D2D-R forwards the related information
received from D2D-R along with the calculated Hash value for APK file
Operator Billing DB server.
CONT.
• The Operator Billing Server forwards the received hash value to App Store
Billing server to verify the file correctness
• If the APK file name and APK file hash value matches with App Store Server
DB then Operator Billing server receives a positive response
• Else it gets a negative response about the file availability in the App Store DB.
• Based on the response from App Store server the Operator Billing server
sends a safe/unsafe message to D2D-R also performs billing for both D2D-S
and D2D-R.
• The above process takes place between 1 second to ‘N’ minutes depending
upon the file size being transferred between two mobiles.
http://dx.doi.org/10.1145/2808062.2808071
CONT.
The proposed framework clearly shows that
• Network congestion gets alleviated,
• High user pricing (service price + content price) gets reduced, and
• Possibilities of various UE vulnerabilities (security threats) get reduced to
maximum extent.
CONCLUSION
• Good for sharing social media content and apps
• Reduces internet traffic, cost of data transfer
• Device battery consumption might be an issue.
• As uses strong security methodlogy difficult for untrusions.
• Might be a key tool for social networking and other internet apps
REFERENCES
• Feiran Wang, Chen Xu, Lingyang Song, Qun Zhao, Xiaoli Wang, and Zhu Han, “Energy-Aware Resource
Allocation for Device-to-Device Underlay Communication," IEEE International Conference on
Communications, Budapest, Hungary, June 2013.
• Rongqing Zhang, Lingyang Song, Zhu Han, Xiang Cheng, and Bingli Jiao, “Distributed Resource Allocation
for Device-to-Device Communications Underlaying Cellular Networks," IEEE International Conference on
Communications, Budapest, Hungary, June 2013.
• Feiran Wang, Lingyang Song, Zhu Han, Qun Zhao, Xiaoli Wang, “Joint Scheduling and Resource Allocation
for Device-to-Device Underlay Communication,” 2013 IEEE Wireless Communications and Networking
Conference (WCNC), Shanghai China, Apr. 2013.
• Sambasivam Ramasubramanian, Sam Chung, Seungwan Ryu, and Ling Ding, “Secure and Smart Media
Sharing Based on a Novel Mobile Device-to-Device Communication Framework with Security and
Procedures,”. Proceedings of the 4th Annual ACM Conference on Research in Information Technology (RIIT
'15). ACM, New York, NY, USA, Sep. 2015