Next Article in Journal
MaxSkew and MultiSkew: Two R Packages for Detecting, Measuring and Removing Multivariate Skewness
Previous Article in Journal
Tight-Binding Modeling of Nucleic Acid Sequences: Interplay between Various Types of Order or Disorder and Charge Transport
Article Menu

Export Article

Open AccessArticle

Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis

Department of Computer Engineering, Chosun University, Gwangju 61452, Korea
Department of Global Business, Gachon University, Gyeonggi-do 13120, Korea
Information Security Research Center, Harbin Engineering University, Harbin 150001, China
Department of Electronic Engineering, Chosun University, Gwangju 61452, Korea
Author to whom correspondence should be addressed.
Symmetry 2019, 11(8), 969;
Received: 17 July 2019 / Revised: 27 July 2019 / Accepted: 28 July 2019 / Published: 1 August 2019
PDF [492 KB, uploaded 1 August 2019]


Nowadays, with rapid advancement of both the upcoming 5G architecture construction and emerging Internet of Things (IoT) scenarios, Device-to-Device (D2D) communication provides a novel paradigm for mobile networking. By facilitating continuous and high data rate services between physically proximate devices without interconnection with access points (AP) or service network (SN), spectral efficiency of the 5G network can be drastically increased. However, due to its inherent open wireless communicating features, security issues and privacy risks in D2D communication remain unsolved in spite of its benefits and prosperous future. Hence, proper D2D authentication mechanisms among the D2D entities are of great significance. Moreover, the increasing proliferation of smartphones enables seamlessly biometric sensor data collecting and processing, which highly correspond to the user’s unique behavioral characteristics. For the above consideration, we present a secure certificateless D2D authenticating mechanism intended for extreme scenarios in this paper. In the assumption, the key updating mechanism only requires a small modification in the SN side, while the decryption information of user equipment (UEs) remains constant as soon as the UEs are validated. Note that a symmetric key mechanism is adopted for the further data transmission. Additionally, the user activities data from smartphone sensors are analyzed for continuous authentication, which is periodically conducted after the initial validation. Note that in the assumed scenario, most of the UEs are out of the effective range of cellular networks. In this case, the UEs are capable of conducting data exchange without cellular connection. Security analysis demonstrates that the proposed scheme can provide adequate security properties as well as resistance to various attacks. Furthermore, performance analysis proves that the proposed scheme is efficient compared with state-of-the-art D2D authentication schemes. View Full-Text
Keywords: Device to Device communication (D2D); certificateless authentication; security and privacy; human activity recognition; continuous authentication Device to Device communication (D2D); certificateless authentication; security and privacy; human activity recognition; continuous authentication

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Tan, H.; Song, Y.; Xuan, S.; Pan, S.; Chung, I. Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis. Symmetry 2019, 11, 969.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Symmetry EISSN 2073-8994 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top