دانلود و نمایش مقالات مرتبط با ارتباط دستگاه به دستگاه (D2D)::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - ارتباط دستگاه به دستگاه (D2D)

تعداد مقالات یافته شده: 2
ردیف عنوان نوع
1 A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT
پروتکل ایمن تأیید هویت متقابل D2D و قرارداد کلیدی برای اینترنت اشیا-2022
Internet of Things (IoT) is a developing technology in our time that is prone to security problems as it uses wireless and shared networks. A challenging scenario in IoT environments is Device-to- Device (D2D) communication where an authentication server, as a trusted third-party, does not participate in the Authentication and Key Agreement (AKA) process and only cooperates in the process of allocating and updating long-term secret keys. Various authentication protocols have been suggested for such situations but have not been able to meet security and efficiency re- quirements. This paper examined three related protocols and demonstrated that they failed to remain anonymous and insecure against Key Compromise Impersonation (KCI) and clogging at- tacks. To counter these pitfalls, a new D2D mutual AKA protocol that is anonymous, untraceable, and highly secure was designed that needed no secure channel to generate paired private and public keys in the registration phase. Formal security proof and security analysis using BAN logic, Real-Or-Random (ROR) model, and Scyther tool showed that our proposed protocol satisfied security requirements. The communication and computation costs and energy consumption comparisons denoted that our design had a better performance than existing protocols.
keywords: تأیید اعتبار و توافقنامه کلید (AKA) | ارتباط دستگاه به دستگاه (D2D) | اینترنت اشیا (IoT) | حمله جعل هویت کلیدی (KCI) | Authentication and Key Agreement (AKA) | Device to Device (D2D) communication | Internet of Things (IoT) | Key Compromise Impersonation (KCI) attack
مقاله انگلیسی
2 A survey on device-to-device (D2D) communication_ Architecture and security issues
یک نظرسنجی در رابطه با ارتباطات دستگاه به دستگاه (D2D) - معماری و مسائل امنیتی-2017
The number of devices is expected to radically increase in near future, with an estimate of above 50 billion connected devices by 2020. The subscribers demand improved data rates, with reduced latency and increased system capacity. To endure the rising demands, cellular networks need to undergo suitable changes. For fulfillment of the rising needs of users and efficient utilization of the available scarce resources, device-to-device (D2D) communication is being looked upon as an important emerging technology for present and future cellular networks. It allows peer-to-peer communication between users, with improved spectral efficiency, energy efficiency and system throughput. In this paper, a detailed survey on device-to-device (D2D) communications has been offered, along with the challenges which exist for D2D (like resource allocation, security, interference management etc.) to become a successful paradigm of wireless networks. In order to fulfill the subscriber needs, architecture has been proposed which assures overcoming the various implementation challenges of D2D communication. The paper largely focuses on security in D2D communication and the possible attacks to which the direct links are susceptible to. For ensuring a secure D2D communication, solution has been proposed, based upon Internet Protocol Security (IP Sec).
Keywords:Device-to-device (D2D) communication | Spectral efficiency | Resource allocation | Security | Internet Protocol Security (IP Sec)
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 5726 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 5726 :::::::: افراد آنلاین: 80