Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for end-to-end secure communication in device-to-device communication networks

A technology for user equipment and wireless networks, applied in secure communication devices, wireless communication, transmission systems, etc., can solve problems such as privacy violation, the system cannot provide security, and does not solve the security problem of "multi-hop" scenarios, so as to protect privacy. , the effect of preventing malicious eavesdropping

Pending Publication Date: 2020-08-11
SIGNIFY HLDG BV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Existing systems do not provide an adequate level of security in various situations, such as partial coverage or out-of-coverage scenarios (i.e., where at least some or all devices are not within communication range of a base station or other network infrastructure), because it is more difficult to Where malicious users authenticate legitimate users, these malicious users may attempt to perform attacks in direct communication with other UEs, such as by creating false identities, eavesdropping, impersonation, data interception, user manipulation, and privacy violations
Furthermore, existing systems do not address security concerns in "multi-hop" scenarios, where data must be relayed through multiple intermediate user devices
Security cannot be guaranteed in this multi-hop scenario as intermediate relay user devices may attempt to intercept and obtain data rather than pass it on to the intended recipient uninterrupted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for end-to-end secure communication in device-to-device communication networks
  • System and method for end-to-end secure communication in device-to-device communication networks
  • System and method for end-to-end secure communication in device-to-device communication networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] This disclosure describes various embodiments and implementations herein are directed to a communication system comprising a plurality of user equipments wishing to participate in D2D communication. The user equipment includes a key application module associated with each user equipment proximity based service application. The key application module of each UE manages a pair of asymmetric public and private encryption keys (“keys”) for that UE, while the ProSe application enables UEs to detect other UEs and participate in D2D communications. Two user devices can start communicating by authenticating themselves in an authentication process where the first (sender) user device uses its private key to create a digital signature and the second (receiver) user device's public key key to encrypt transmissions (or "data"). The second (receiving) user device can use its own private key to decrypt the transmission, while the first (sender) user device's public key is used to ve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method for enabling secure device-to-device (D2D) communication between a plurality of user devices. The method includes providing public and private keys for each of the user devices, the private key arranged to decrypt data encrypted by the corresponding public key. A sender user device creates a digital signature using its private key. The sender double-encrypts a transmission using both the public keys of a recipient user device and a first relay user device. The transmission is transmitted from the sender to the recipient through a plurality of relay user devices. Each relayuser device receives the transmission, decrypts a first layer of encryption with its private key, encrypts the transmission with the public key of a subsequent user device; and forwards the data transmission to the subsequent user device. The recipient authenticates the digital signature of the sender using the public key of the sender.

Description

technical field [0001] The present disclosure is generally directed to systems and methods for providing end-to-end secure communications in a device-to-device (D2D) communication network. Background technique [0002] Consumers have always benefited from the continuous advancement of cellular communication technology in terms of speed, reliability, functionality, coverage and more. However, new technologies bring new risks, and in particular identity and data theft pose a real and growing threat that must be addressed when implementing these technologies. Device-to-device (D2D) communication over cellular networks is one such advanced technology, but it also exposes user equipment (or "user equipment" or "UE") that supports D2D communication to new security threats. [0003] More specifically, cellular D2D communication is an emerging type of wireless technology that enables devices to communicate directly without the need for fixed or centralized network infrastructure su...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04L29/06
CPCH04L63/0442H04L63/0464H04L63/0478H04W76/14H04W4/80H04W12/03H04W12/0431H04L9/0894H04L9/14H04L9/3073H04L9/3247H04L63/0435H04L9/50
Inventor 张玉婷俞进姜聃韩东
Owner SIGNIFY HLDG BV