Towards bootstrapping trust in D2D using PGP and reputation mechanism

Muhammad Usman, Muhammad Rizwan Asghar, Imran Shafique Ansari, Fabrizio Granelli

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)


Device-to-Device (D2D) communication has emerged as a new technology, which minimizes data transmission in radio access networks by leveraging direct interaction between nearby mobile devices. D2D communication has a great potential in solving the capacity bottleneck problem of cellular networks by offloading cellular traffic of proximity-based applications to D2D links. This provides several benefits including, but are not limited to, lower transfer delays, higher data rates, and better energy efficiency. However, security in D2D communication, which is equally essential for the success of D2D communication in future networks, is a less investigated topic in literature. In this paper, we propose the combination of the PGP and reputation-based model to bootstrap trust in D2D environments. Our proposal aims at minimizing any suspicious connection with selfish users. Offloading cellular traffic to trusted D2D links provides significant throughput gain over the conventional cellular network. Our results show that the capacity gain can be as high as 133%.
Original languageEnglish
Title of host publication2017 IEEE International Conference on Communications (ICC)
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages6
ISBN (Electronic)9781467389990
ISBN (Print)9781467390002
Publication statusPublished - 31 Jul 2017
Event2017 IEEE International Conference on Communications (ICC) - Palais des Congrès - Porte Maillot, Paris, France
Duration: 21 May 201725 May 2017 (Link to conference website)

Publication series

ISSN (Electronic)1938-1883


Conference2017 IEEE International Conference on Communications (ICC)
Abbreviated titleIEEE ICC 2017
Internet address


  • D2D communication
  • 5G networks
  • security
  • trust
  • PGP
  • reputation-based model
  • proximity-based applications ,
  • cellular traffic offloading
  • capacity


Dive into the research topics of 'Towards bootstrapping trust in D2D using PGP and reputation mechanism'. Together they form a unique fingerprint.

Cite this