{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T22:11:50Z","timestamp":1770761510581,"version":"3.50.0"},"reference-count":23,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2018,7,11]],"date-time":"2018-07-11T00:00:00Z","timestamp":1531267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Device-to-device (D2D) communication is considered as one of the key enabling technologies for fifth-generation (5G) networks as it allows data offloading generated by the huge number of connected devices. In this respect, group-oriented services are among the most interesting usage scenarios. Indeed, D2D can improve the performance of the conventional multicast scheme (CMS) in cellular networks, which is known to suffer from low spectral efficiency. Security is a further key field of investigation for 5G systems, as any threat to privacy and security may lead to both deteriorated user experience and inefficient network resources\u2019 utilization. Security issues are even more in focus for D2D connections between devices that are in mutual proximity. To improve the CMS performance and also sustain security requirements of the 5G network, this work proposes a secure D2D data transmission algorithm. Making use of mechanisms such as encryption and signature, this algorithm aims to protect the exchanged data and the privacy of the devices involved in the communication. A simulation campaign conducted using MATLAB shows the ability of the proposed solution to take advantage of the establishment of secure D2D communications and efficiently utilize network resources.<\/jats:p>","DOI":"10.3390\/fi10070066","type":"journal-article","created":{"date-parts":[[2018,7,11]],"date-time":"2018-07-11T03:24:19Z","timestamp":1531279459000},"page":"66","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Enabling Trustworthy Multicast Wireless Services through D2D Communications in 5G Networks"],"prefix":"10.3390","volume":"10","author":[{"given":"Sara","family":"Pizzi","sequence":"first","affiliation":[{"name":"DIIES, University \u201cMediterranea\u201d of Reggio Calabria, Via Graziella, Loc. Feo di Vito, 89100 Reggio Calabria, Italy"}]},{"given":"Chiara","family":"Suraci","sequence":"additional","affiliation":[{"name":"DIIES, University \u201cMediterranea\u201d of Reggio Calabria, Via Graziella, Loc. Feo di Vito, 89100 Reggio Calabria, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5056-4272","authenticated-orcid":false,"given":"Leonardo","family":"Militano","sequence":"additional","affiliation":[{"name":"DIIES, University \u201cMediterranea\u201d of Reggio Calabria, Via Graziella, Loc. Feo di Vito, 89100 Reggio Calabria, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3183-1467","authenticated-orcid":false,"given":"Antonino","family":"Orsino","sequence":"additional","affiliation":[{"name":"Ericsson Research, Hirsalantie 11, 02420 Jorvas, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2731-300X","authenticated-orcid":false,"given":"Antonella","family":"Molinaro","sequence":"additional","affiliation":[{"name":"DIIES, University \u201cMediterranea\u201d of Reggio Calabria, Via Graziella, Loc. Feo di Vito, 89100 Reggio Calabria, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5414-8252","authenticated-orcid":false,"given":"Antonio","family":"Iera","sequence":"additional","affiliation":[{"name":"DIIES, University \u201cMediterranea\u201d of Reggio Calabria, Via Graziella, Loc. Feo di Vito, 89100 Reggio Calabria, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8670-9413","authenticated-orcid":false,"given":"Giuseppe","family":"Araniti","sequence":"additional","affiliation":[{"name":"DIIES, University \u201cMediterranea\u201d of Reggio Calabria, Via Graziella, Loc. Feo di Vito, 89100 Reggio Calabria, Italy"}]}],"member":"1968","published-online":{"date-parts":[[2018,7,11]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/MCOM.2012.6163598","article-title":"Design aspects of network assisted device-to-device communications","volume":"50","author":"Fodor","year":"2012","journal-title":"IEEE Commun. Mag."},{"key":"ref_2","unstructured":"CISCO (2018, July 09). Cisco Visual Networking Index: Forecast and Methodology, 2016\u20132021. Available online: https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/complete-white-paper-c11-481360.html."},{"key":"ref_3","unstructured":"3GPP (2018, July 09). Evolved Universal Terrestrial Radio Access Network (E-UTRAN); General Aspects and Principles for Interfaces Supporting Multimedia Broadcast Multicast Service (MBMS) within E-UTRAN. Available online: https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=2455."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Liu, J., Chen, W., Cao, Z., and Letaief, K. (2008, January 19\u201323). Dynamic power and sub- carrier allocation for OFDMA-based wireless multicast systems. Proceedings of the 2008 IEEE International Conference on Communications (ICC), Beijing, China.","DOI":"10.1109\/ICC.2008.494"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1109\/TBC.2015.2400824","article-title":"Single Frequency-Based Device-to-Device-Enhanced Video Delivery for Evolved Multimedia Broadcast and Multicast Services","volume":"61","author":"Militano","year":"2015","journal-title":"IEEE Trans. Broadcast."},{"key":"ref_6","unstructured":"ERICSSON (2018, July 09). 5G Security\u2014Enabling a Trustworthy 5G System. Available online: https:\/\/www.ericsson.com\/en\/white-papers\/5g-security---enabling-a-trustworthy-5g-system."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.jnca.2016.11.002","article-title":"A survey on device-to-device (D2D) communication: Architecture and security issues","volume":"78","author":"Gandotra","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1054","DOI":"10.1109\/COMST.2017.2649687","article-title":"Security and Privacy in Device-to-Device (D2D) Communication: A Review","volume":"19","author":"Haus","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/s11036-016-0741-5","article-title":"A Survey on Security in D2D Communications","volume":"22","author":"Wang","year":"2017","journal-title":"Mob. Netw. Appl."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2659","DOI":"10.1109\/TVT.2015.2416002","article-title":"SeDS: Secure Data Sharing Strategy for D2D Communication in LTE-Advanced Networks","volume":"65","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_11","unstructured":"GSMA Intelligence (2018, July 09). Understanding 5G: Perspectives on Future Technological Advancements in Mobile. Available online: https:\/\/www.gsmaintelligence.com\/research\/?file=141208-5g.pdf&download."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.comnet.2016.06.010","article-title":"5G roadmap: 10 key enabling technologies","volume":"106","author":"Akyildiz","year":"2016","journal-title":"Comput. Netw."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1801","DOI":"10.1109\/COMST.2014.2319555","article-title":"A Survey on Device-to-Device Communications in Cellular Networks","volume":"16","author":"Asadi","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_14","first-page":"1821084","article-title":"Network-assisted Distributed Fairness-aware Interference Coordination for Device to Device Communication Underlaid Cellular networks","volume":"2017","author":"Boabang","year":"2017","journal-title":"Mob. Inf. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1016\/j.comnet.2015.08.007","article-title":"A Multi-Timescale Cross-Layer Approach for Wireless Ad Hoc Networks","volume":"18","author":"Pham","year":"2015","journal-title":"Comput. Netw."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MNET.2017.1600067NM","article-title":"Multicasting over Emerging 5G Networks: Challenges and Perspectives","volume":"31","author":"Araniti","year":"2017","journal-title":"IEEE Netw."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1109\/MCOM.2018.1700667","article-title":"Resource Allocation for 5G D2D Multicast Content Sharing in Social-Aware Cellular Networks","volume":"56","author":"Feng","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"26340","DOI":"10.1109\/ACCESS.2017.2776289","article-title":"Resource Allocation Schemes for Revenue Maximization in Multicast D2D Networks","volume":"5","author":"Bhat","year":"2017","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1109\/MCOM.2014.6829954","article-title":"Game theoretic D2D content dissemination in 4G cellular networks","volume":"52","author":"Antonopoulos","year":"2014","journal-title":"IEEE Commun. Mag."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"3176","DOI":"10.1109\/TWC.2017.2675887","article-title":"Cross-Network Performance Analysis of Network Coding Aided Cooperative Outband D2D Communications","volume":"16","author":"Datsika","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"e4","DOI":"10.4108\/eai.26-10-2015.150598","article-title":"Device-to-Device Communications for 5G Internet of Things","volume":"1","author":"Militano","year":"2015","journal-title":"EAI Endorsed Trans. Internet Things"},{"key":"ref_22","unstructured":"3GPP (2018, July 09). Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN). Available online: https:\/\/www.etsi.org\/deliver\/etsi_ts\/136300_136399\/136300\/11.05.00_60\/ts_136300v110500p.pdf."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New Directions in Cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/10\/7\/66\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:11:32Z","timestamp":1760195492000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/10\/7\/66"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,11]]},"references-count":23,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2018,7]]}},"alternative-id":["fi10070066"],"URL":"https:\/\/doi.org\/10.3390\/fi10070066","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,11]]}}}