TY - JOUR ID - 57447 TI - An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks JO - The ISC International Journal of Information Security JA - ISECURE LA - en SN - 2008-2045 AU - Mohseni-Ejiyeh, A. AU - Ashouri-Talouki, M. AU - Mahdavi, M. AD - Department of Information Technology Engineering, Faculty of Computer Engineering, University of Isfahan, Isfahan, Iran Y1 - 2018 PY - 2018 VL - 10 IS - 1 SP - 15 EP - 27 KW - D2D communications KW - traffic offloading KW - Security KW - lightweight KW - data sharing KW - incentive DO - 10.22042/isecure.2018.111195.401 N2 - Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, direct wireless connections between devices in D2D communication are vulnerable to certain security threats. In this paper, we propose an incentive-aware lightweight secure data sharing scheme for D2D communication. We have considered the major security challenges of the data sharing scheme, including data confidentiality, integrity, detecting message modification, and preventing the propagation of malformed data. We have also applied an incentive mechanism to motivate users involvement in the process of data sharing. Actually, D2D communication is highly dependent on user participation in sharing content, so, we apply the concept of virtual check to motivate users(named proxy users)to help the requesting user(client) in the process of obtaining the data. Unlike the previous studies, our proposed protocol is an stateless protocol and does not depend on the users contextual information. Therefore, it can be used at anytime and from anywhere. The security analysis proves that the proposed protocol resists the security attacks and meets the security requirements. The performance evaluation shows that the proposed protocol outperforms the previous works in terms of communication and computation cost. Thus, the proposed protocol is indeed an efficient and practical solution for secure data sharing in D2D communication. UR - https://www.isecure-journal.com/article_57447.html L1 - https://www.isecure-journal.com/article_57447_b0811bf95521e02c8421310095dce002.pdf ER -