System and method for end-to-end secure communication in device-to-device communication networks
A technology for user equipment and wireless networks, applied in secure communication devices, wireless communication, transmission systems, etc., can solve problems such as privacy violation, the system cannot provide security, and does not solve the security problem of "multi-hop" scenarios, so as to protect privacy. , the effect of preventing malicious eavesdropping
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] This disclosure describes various embodiments and implementations herein are directed to a communication system comprising a plurality of user equipments wishing to participate in D2D communication. The user equipment includes a key application module associated with each user equipment proximity based service application. The key application module of each UE manages a pair of asymmetric public and private encryption keys (“keys”) for that UE, while the ProSe application enables UEs to detect other UEs and participate in D2D communications. Two user devices can start communicating by authenticating themselves in an authentication process where the first (sender) user device uses its private key to create a digital signature and the second (receiver) user device's public key key to encrypt transmissions (or "data"). The second (receiving) user device can use its own private key to decrypt the transmission, while the first (sender) user device's public key is used to ve...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


