Device-to-Device (D2D) communication is expected to be a key feature supported by next generation cellular networks. D2D can extend the cellular coverage allowing users to communicate when telecommunications infrastructure are highly congested or absent. In D2D networks, any message delivery from a source to a destination relies exclusively on intermediate devices. Each device can run different kinds of mobile security software, which offer protection against viruses and other harmful programs by using real-time scanning in every file entering the device. In this paper, we investigate the best D2D network path to deliver a potentially malicious message from a source to a destination. Although our primary objective is to increase security, we also investigate the contribution of energy costs and quality-of-service to the path selection. To this end, we propose the Secure Message Delivery (SMD) protocol, whose main functionality is determined by the solution of the Secure Message Delivery Game (SMDG). This game is played between the defender (i.e., the D2D network) which abstracts all legitimate network devices and theattackerwhich abstracts any adversary that can inject different malicious messages into the D2D network in order, for instance, to infect a device with malware. Simulation results demonstrate the degree of improvement that SMD introduces as opposed to a shortest path routing protocol. This improvement has been measured in terms of the defender’s expected cost as defined in SMDGs. This cost includes security expected damages, energy consumption incurred due to messages inspection, and the quality-of-service of the D2D message communications.
|Title of host publication||5th International Conference, GameSec 2014|
|Place of Publication||California, US|
|Publisher||Springer International Publishing|
|Number of pages||21|
|Publication status||Published - 6 Nov 2014|
|Event||5th International Conference, GameSec 2014 - California, US, 6-7 November 2014|
Duration: 6 Nov 2014 → …
|Name||Lecture Notes in Computer Science|
|Conference||5th International Conference, GameSec 2014|
|Period||6/11/14 → …|
Bibliographical noteThe final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-12601-2_11.
- game theory
- device-to-device communications
Panaousis, E., Alpcan, T., Fereidooni, H., & Conti, M. (2014). Secure message delivery games for device-to-device communications. In 5th International Conference, GameSec 2014 (Vol. 8840, pp. 195-215). (Lecture Notes in Computer Science). Springer International Publishing. https://doi.org/10.1007/978-3-319-12601-2_11