参考文献/References:
[1] Doppler K,Rinne M, Wijting C, et al. Device-to-device communication as an underlay to LTE-advanced networks[J]. IEEE Communications Magazine, 2009, 47(12): 42-49. DOI:10.1109/mcom.2009.5350367.
[2] Doppler K, Yu C H, Ribeiro C B, et al. Mode selection for device-to-device communication underlaying an LTE-advanced network[C]//2010 IEEE Wireless Communication and Networking Conference. Sydney, Australia, 2010: 1-6. DOI:10.1109/wcnc.2010.5506248.
[3] Lei L,Zhong Z D, Lin C, et al. Operator controlled device-to-device communications in LTE-advanced networks[J]. IEEE Wireless Communications, 2012, 19(3): 96-104. DOI:10.1109/mwc.2012.6231164.
[4] Wu X Z,Tavildar S, Shakkottai S, et al. FlashLinQ: A synchronous distributed scheduler for peer-to-peer ad hoc networks[J]. ACM Transactions on Networking, 2013, 21(4): 1215-1228. DOI:10.1109/tnet.2013.2264633.
[5] Gamage A T, Liang H, Zhang R, et al. Device-to-device communication underlaying converged heterogeneous networks[J]. IEEE Wireless Communications, 2014, 21(6): 98-107. DOI:10.1109/mwc.2014.7000977.
[6] Janis P, Yu C H, Doppler K, et al. Device-to-device communication underlaying cellular communications systems[J]. International Journal of Communications, Network and System Sciences, 2009, 2(3): 169-178. DOI:10.4236/ijcns.2009.23019.
[7] Alam M, Yang D, Rodriguez J, et al. Secure device-to-device communication in LTE-A[J]. IEEE Communications Magazine, 2014, 52(4): 66-73.
[8] Shen W L, Hong W S, Cao X H, et al. Secure key establishment for Device-to-Device communications[C]//2014 IEEE Global Communications Conference. Austin, TX, USA, 2014: 336-340. DOI:10.1109/glocom.2014.7036830.
[9] Sedidi R, Kumar A. Key exchange protocols for secure device-to-device(D2D)communication in 5G[C]//2016 Wireless Days(WD). Toulouse, France, 2016: 1-6. DOI:10.1109/wd.2016.7461477.
[10] Wang M J, Yan Z,Niemi V. UAKA-D2D: Universal authentication and key agreement protocol in D2D communications[J]. Mobile Networks and Applications, 2017, 22(3): 510-525. DOI:10.1007/s11036-017-0870-5.
[11] Guo J J, Ma J F, Li X H, et al. An attribute-based trust negotiation protocol for D2D communication in smart city balancing trust and privacy[J]. Information Science and Engineering, 2017, 33(4):1007-1023. DOI: 10.6688/JISE.2017.33.4.10.
[12] Zhang A Q, Wang L, Ye X R, et al. Light-weight and robust security-aware D2D-assist data transmission protocol for mobile-health systems[J].IEEE Transactions on Information Forensics and Security, 2017, 12(3): 662-675. DOI:10.1109/tifs.2016.2631950.
[13] Zhang A Q, Chen J X, Hu R Q, et al. SeDS: Secure data sharing strategy for D2D communication in LTE-advanced networks[J]. IEEE Transactions on Vehicular Technology, 2016, 65(4): 2659-2672. DOI:10.1109/tvt.2015.2416002.
[14] Hsu R H, Lee J,Quek T Q S, et al. GRAAD: Group anonymous and accountable D2D communication in mobile networks[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(2): 449-464. DOI:10.1109/tifs.2017.2756567.
[15] Hsu R H, Lee J. Group anonymous D2D communication with end-to-end security in LTE-A[C]//2015 IEEE Conference on Communications and Network Security(CNS). Florence, Italy, 2015: 451–459. DOI:10.1109/cns.2015.7346857.
[16] Tan H W, Song Y Z, Xuan S C, et al. Secure D2D group authentication employing smartphone sensor behavior analysis[J].Symmetry, 2019, 11(8): 969. DOI:10.3390/sym11080969.
[17] Wang M J, Yan Z. Privacy-preserving authentication and key agreement protocols for D2D group communications[J].IEEE Transactions on Industrial Informatics, 2018, 14(8): 3637-3647. DOI:10.1109/tii.2017.2778090.
[18] Wang L J, Tian Y L, Zhang D, et al. Constant-round authenticated and dynamic group key agreement protocol for D2D group communications[J].Information Sciences, 2019, 503: 61-71. DOI:10.1016/j.ins.2019.06.067.
[19] Mustafa U, Philip N. Group-based key exchange for medical IoT device-to-device communication(D2D)combining secret sharing and physical layer key exchange[C]//2019 IEEE 12th International Conference on Global Security, Safety and Sustainability(ICGS3). London, United Kingdom, 2019: 42-48. DOI:10.1109/icgs3.2019.8688022.
[20] Steinfeld R, Bull L, Wang H X, et al. Universal designated-verifier signatures[M]//Advances in Cryptology-ASIACRYPT 2003. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003, 2894: 523-542. DOI:10.1007/978-3-540-40061-5_33.
[21] Choi K Y, Hwang J Y, Lee D H. Efficient ID-based group key agreement with bilinear maps[M]//Public Key Cryptography-PKC 2004. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004, 2947: 130-144. DOI:10.1007/978-3-540-24632-9_10.
[22] Wang J M, Lang B. An efficient KP-ABE scheme for content protection in Information-Centric Networking[C]//2016 IEEE Symposium on Computers and Communication(ISCC). Messina, Italy, 2016: 830-837. DOI:10.1109/iscc.2016.7543839.
相似文献/References:
[1]宋宇波,陈开志,姚冰心.基于自我加密的无线局域网快速切换认证[J].东南大学学报(自然科学版),2007,37(6):945.[doi:10.3969/j.issn.1001-0505.2007.06.001]
Song Yubo,Chen Kaizhi,Yao Bingxin.Fast handoff authentication scheme of WLAN based on self-encryption[J].Journal of Southeast University (Natural Science Edition),2007,37(5):945.[doi:10.3969/j.issn.1001-0505.2007.06.001]
[2]邢媛,蒋睿.基于串空间模型的UMTS AKA协议安全分析与改进[J].东南大学学报(自然科学版),2010,40(6):1163.[doi:10.3969/j.issn.1001-0505.2010.06.007]
Xing Yuan,Jiang Rui.Security analysis and improvement of UMTS AKA protocol based on strand space model[J].Journal of Southeast University (Natural Science Edition),2010,40(5):1163.[doi:10.3969/j.issn.1001-0505.2010.06.007]