{"id":"https://openalex.org/W3217638756","doi":"https://doi.org/10.1080/09540091.2021.2002812","title":"A lightweight D2D security protocol with request-forecasting for next-generation mobile networks","display_name":"A lightweight D2D security protocol with request-forecasting for next-generation mobile networks","publication_year":2021,"publication_date":"2021-11-30","ids":{"openalex":"https://openalex.org/W3217638756","doi":"https://doi.org/10.1080/09540091.2021.2002812","mag":"3217638756"},"language":"en","primary_location":{"id":"doi:10.1080/09540091.2021.2002812","is_oa":true,"landing_page_url":"https://doi.org/10.1080/09540091.2021.2002812","pdf_url":null,"source":{"id":"https://openalex.org/S4210188800","display_name":"Connection Science","issn_l":"0954-0091","issn":["0954-0091","1360-0494"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Connection Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1080/09540091.2021.2002812","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025186992","display_name":"Daniel Gerbi Duguma","orcid":"https://orcid.org/0000-0002-7121-4204"},"institutions":[{"id":"https://openalex.org/I24541011","display_name":"Soonchunhyang University","ror":"https://ror.org/03qjsrb10","country_code":"KR","type":"education","lineage":["https://openalex.org/I24541011"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Daniel Gerbi Duguma","raw_affiliation_strings":["Department of Information Security Engineering, Soonchunhyang University, Asan, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Information Security Engineering, Soonchunhyang University, Asan, Republic of Korea","institution_ids":["https://openalex.org/I24541011"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100731860","display_name":"Jiyoon Kim","orcid":"https://orcid.org/0000-0003-2710-0864"},"institutions":[{"id":"https://openalex.org/I24541011","display_name":"Soonchunhyang University","ror":"https://ror.org/03qjsrb10","country_code":"KR","type":"education","lineage":["https://openalex.org/I24541011"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jiyoon Kim","raw_affiliation_strings":["Department of Information Security Engineering, Soonchunhyang University, Asan, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Information Security Engineering, Soonchunhyang University, Asan, Republic of Korea","institution_ids":["https://openalex.org/I24541011"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100319609","display_name":"Sangmin Lee","orcid":"https://orcid.org/0000-0002-4396-6118"},"institutions":[{"id":"https://openalex.org/I24541011","display_name":"Soonchunhyang University","ror":"https://ror.org/03qjsrb10","country_code":"KR","type":"education","lineage":["https://openalex.org/I24541011"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sangmin Lee","raw_affiliation_strings":["Department of Information Security Engineering, Soonchunhyang University, Asan, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Information Security Engineering, Soonchunhyang University, Asan, Republic of Korea","institution_ids":["https://openalex.org/I24541011"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073972669","display_name":"Nam-Su Jho","orcid":"https://orcid.org/0000-0003-1721-5350"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Nam-Su Jho","raw_affiliation_strings":["Electronics and Telecommunications Research Institute (ETRI), Daejeon, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Electronics and Telecommunications Research Institute (ETRI), Daejeon, Republic of Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068070266","display_name":"Vishal Sharma","orcid":"https://orcid.org/0000-0001-7470-6506"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Vishal Sharma","raw_affiliation_strings":["School of Electronics, Electrical Engineering and Computer Science, Queen's University Belfast (QUB), Belfast, UK"],"affiliations":[{"raw_affiliation_string":"School of Electronics, Electrical Engineering and Computer Science, Queen's University Belfast (QUB), Belfast, UK","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017792460","display_name":"Ilsun You","orcid":"https://orcid.org/0000-0002-0604-3445"},"institutions":[{"id":"https://openalex.org/I24541011","display_name":"Soonchunhyang University","ror":"https://ror.org/03qjsrb10","country_code":"KR","type":"education","lineage":["https://openalex.org/I24541011"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Ilsun You","raw_affiliation_strings":["Department of Information Security Engineering, Soonchunhyang University, Asan, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Information Security Engineering, Soonchunhyang University, Asan, Republic of Korea","institution_ids":["https://openalex.org/I24541011"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5017792460"],"corresponding_institution_ids":["https://openalex.org/I24541011"],"apc_list":{"value":1270,"currency":"USD","value_usd":1270},"apc_paid":{"value":1270,"currency":"USD","value_usd":1270},"fwci":1.6003,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.84668441,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"34","issue":"1","first_page":"362","last_page":"386"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8919280767440796},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5597102642059326},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5095041394233704},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5007205009460449},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.48969176411628723},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.4845658838748932},{"id":"https://openalex.org/keywords/communications-protocol","display_name":"Communications protocol","score":0.47719940543174744},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.459007203578949},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.4362049996852875},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.41110509634017944},{"id":"https://openalex.org/keywords/telecommunications-network","display_name":"Telecommunications network","score":0.4103184938430786},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3798961043357849},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3542327880859375},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.26621681451797485},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.14179831743240356},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1339586079120636}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8919280767440796},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5597102642059326},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5095041394233704},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5007205009460449},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.48969176411628723},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.4845658838748932},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.47719940543174744},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.459007203578949},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.4362049996852875},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.41110509634017944},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.4103184938430786},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3798961043357849},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3542327880859375},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.26621681451797485},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.14179831743240356},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1339586079120636},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1080/09540091.2021.2002812","is_oa":true,"landing_page_url":"https://doi.org/10.1080/09540091.2021.2002812","pdf_url":null,"source":{"id":"https://openalex.org/S4210188800","display_name":"Connection Science","issn_l":"0954-0091","issn":["0954-0091","1360-0494"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Connection Science","raw_type":"journal-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:publications/cc5e2b53-0828-4297-9c1f-3a134ed818b4","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/cc5e2b53-0828-4297-9c1f-3a134ed818b4","pdf_url":null,"source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Duguma, D G, Kim, J, Lee, S, Jho, N-S, Sharma, V & You, I 2021, 'A lightweight D2D security protocol with request-forecasting for next-generation mobile networks', Connection Science. https://doi.org/10.1080/09540091.2021.2002812","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:doaj.org/article:90751ad824e84032a410727f87bc615c","is_oa":true,"landing_page_url":"https://doaj.org/article/90751ad824e84032a410727f87bc615c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Connection Science, Vol 34, Iss 1, Pp 362-386 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1080/09540091.2021.2002812","is_oa":true,"landing_page_url":"https://doi.org/10.1080/09540091.2021.2002812","pdf_url":null,"source":{"id":"https://openalex.org/S4210188800","display_name":"Connection Science","issn_l":"0954-0091","issn":["0954-0091","1360-0494"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Connection Science","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2896300088","display_name":null,"funder_award_id":"20ZR1300","funder_id":"https://openalex.org/F4320322093","funder_display_name":"Electronics and Telecommunications Research Institute"}],"funders":[{"id":"https://openalex.org/F4320321301","display_name":"Soonchunhyang University","ror":"https://ror.org/03qjsrb10"},{"id":"https://openalex.org/F4320322093","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1519021761","https://openalex.org/W1603878273","https://openalex.org/W2020783404","https://openalex.org/W2027367716","https://openalex.org/W2029693536","https://openalex.org/W2175661655","https://openalex.org/W2550816608","https://openalex.org/W2570516435","https://openalex.org/W2618648001","https://openalex.org/W2740289948","https://openalex.org/W2762590152","https://openalex.org/W2782042583","https://openalex.org/W2888457344","https://openalex.org/W2966581125","https://openalex.org/W2996869649","https://openalex.org/W3008343234","https://openalex.org/W3009325512","https://openalex.org/W3012516989","https://openalex.org/W3025413549","https://openalex.org/W3042482502","https://openalex.org/W3080225633","https://openalex.org/W3090860962","https://openalex.org/W3094617817","https://openalex.org/W3108843244","https://openalex.org/W3110128686","https://openalex.org/W3125728023","https://openalex.org/W3139421913","https://openalex.org/W3167424384","https://openalex.org/W3175469749","https://openalex.org/W4254044579","https://openalex.org/W4311363662","https://openalex.org/W4315647710"],"related_works":["https://openalex.org/W2358638783","https://openalex.org/W2252724828","https://openalex.org/W2379701766","https://openalex.org/W164648224","https://openalex.org/W2551197715","https://openalex.org/W1533722674","https://openalex.org/W2382850871","https://openalex.org/W2363650619","https://openalex.org/W2766896269","https://openalex.org/W2154157181"],"abstract_inverted_index":{"5G-assisted":[0],"device-to-device":[1],"(D2D)":[2],"communication":[3,51,92,112,142,160,177,195],"plays":[4],"an":[5],"instrumental":[6],"role":[7],"in":[8,106,196],"minimizing":[9],"latency,":[10],"maximizing":[11],"resource":[12],"utilization,":[13],"improving":[14],"speed,":[15],"and":[16,33,59,88,98,111,143,158,176],"boosting":[17],"system":[18],"capacity.":[19],"However,":[20],"the":[21,38,41,46,137,163],"technology":[22],"confronts":[23],"several":[24,62],"challenges":[25],"to":[26,67,80,139,155,192],"realize":[27],"its":[28],"enormous":[29],"potential":[30],"fully.":[31],"Security":[32,131],"privacy":[34],"concerns":[35],"are":[36,71,78],"at":[37],"top":[39],"of":[40,49,108],"list":[42],"that":[43,180],"can":[44],"jeopardize":[45],"regular":[47],"operation":[48],"D2D":[50,91,130,194],"by":[52],"executing":[53],"various":[54],"assaults":[55],"such":[56],"as":[57],"free-riding":[58],"impersonation.":[60],"Although":[61],"researchers":[63],"suggested":[64],"different":[65],"solutions":[66],"these":[68],"concerns,":[69],"most":[70],"too":[72],"heavy":[73],"for":[74,187],"resource-constrained":[75,188],"devices":[76,138,190],"or":[77],"vulnerable":[79],"security":[81,119,172],"risks.":[82],"Consequently,":[83],"we":[84,147],"proposed":[85],"a":[86,125,184,197],"lightweight":[87],"provably":[89],"secure":[90,116,141],"protocol":[93,103,122,182],"comprising":[94],"initialization,":[95],"device":[96],"discovery,":[97],"link":[99],"setup":[100],"phases.":[101],"The":[102,121,167],"is":[104,165,183],"light":[105],"terms":[107],"computational":[109,175],"overhead":[110],"latency":[113],"while":[114],"verifiably":[115],"through":[117],"formal":[118],"analysis.":[120],"relies":[123],"on":[124],"new":[126],"network":[127,164],"function,":[128],"called":[129],"Management":[132],"Function":[133],"(DSMF),":[134],"located":[135],"near":[136],"facilitate":[140],"improve":[144],"performance.":[145],"Moreover,":[146],"used":[148],"deep":[149],"learning-based":[150],"UE":[151],"trust":[152],"score":[153],"forecasting":[154],"better":[156],"handle":[157],"prioritize":[159],"requests":[161],"when":[162],"overloaded.":[166],"comparative":[168],"analysis":[169],"against":[170],"state-of-the-art":[171],"schemes":[173],"concerning":[174],"overheads":[178],"shows":[179],"our":[181],"superior":[185],"alternative":[186],"IoT":[189],"wishing":[191],"perform":[193],"5G":[198],"network.":[199]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
