Securing D2D Wireless Links by Continuous Authenticity with Legitimacy Patterns | IEEE Conference Publication | IEEE Xplore