Enhancing Security and Privacy in 5G Device-to-Device Communication: A Secure Gale-Shapley Algorithm Approach

被引:0
|
作者
Alruwaili, Musaad [1 ]
Kim, Junghwan [1 ]
Oluoch, Jared [1 ]
机构
[1] Univ Toledo, Coll Engn, Toledo, OH 43606 USA
来源
IEEE ACCESS | 2025年 / 13卷
关键词
Security; Device-to-device communication; Jamming; 5G mobile communication; Full-duplex system; Encryption; Resource management; Wireless communication; Performance evaluation; Real-time systems; 5G networks; device-to-device communication (D2D); security framework; adaptive jamming; AI-driven threat detection; physical layer security; differential privacy; multi-party computation (MPC); lightweight encryption; resource allocation;
D O I
10.1109/ACCESS.2025.3540745
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Device-to-Device (D2D) communication is pivotal in enhancing the performance of 5G networks by improving spectral efficiency, reducing latency, and supporting applications such as the Internet of Things (IoT). Despite these benefits, direct communication pathways in D2D pose significant security and privacy challenges, such as unauthorized access, data eavesdropping, and privacy breaches. To address these issues, we propose a robust and adaptive security framework that integrates AI-enhanced physical layer key generation, full-duplex adaptive jamming, and differential privacy. Our approach employs secure multi-party computation (MPC) and lightweight encryption to protect user preferences and communication data during resource allocation while ensuring optimal system performance. AI-driven key generation dynamically adapts to changing network conditions, whereas the full-duplex adaptive jamming mechanism effectively counteracts eavesdropping threats. We validated the framework through extensive MATLAB simulations, demonstrating its ability to achieve high throughput and low latency, even in the presence of various security threats. The results confirm the efficacy of the framework in safeguarding D2D communications, making it well suited for mission-critical 5G applications, where both performance and security are paramount.
引用
收藏
页码:30623 / 30635
页数:13
相关论文
共 50 条
  • [1] Optimizing 5G Power Allocation With Device-to-Device Communication: A Gale-Shapley Algorithm Approach
    Alruwaili, Musaad
    Kim, Junghwan
    Oluoch, Jared
    IEEE ACCESS, 2024, 12 : 30781 - 30795
  • [2] 5G device-to-device communication security and multipath routing solutions
    Aslihan Celik
    Jessica Tetzner
    Koushik Sinha
    John Matta
    Applied Network Science, 4
  • [3] 5G device-to-device communication security and multipath routing solutions
    Celik, Aslihan
    Tetzner, Jessica
    Sinha, Koushik
    Matta, John
    APPLIED NETWORK SCIENCE, 2019, 4 (01)
  • [4] Editorial: Device-to-Device Communication in 5G Networks
    Sanjay Kumar Biswash
    Artur Ziviani
    Raj Jain
    Jia-Chin Lin
    Joel J. P. C. Rodrigues
    Mobile Networks and Applications, 2017, 22 : 995 - 997
  • [5] Direct Device-to-Device Communication in 5G Networks
    Abd, Senan Ali
    Manjunath, S. S.
    Abdulhayan, Sayed
    2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 216 - 219
  • [6] Editorial: Device-to-Device Communication in 5G Networks
    Biswash, Sanjay Kumar
    Ziviani, Artur
    Jain, Raj
    Lin, Jia-Chin
    Rodrigues, Joel J. P. C.
    MOBILE NETWORKS & APPLICATIONS, 2017, 22 (06): : 995 - 997
  • [7] A Weighted AIMD Congestion Control Algorithm for Device-to-Device Communication in 5G Network
    Malini, S.
    Karthigaikumar, P.
    IETE JOURNAL OF RESEARCH, 2025, 71 (01) : 131 - 138
  • [8] Authentication and Access Control in 5G Device-to-Device Communication
    Panicker, Jithu Geevargheese
    Salehi, Ahmad S.
    Rudolph, Carsten
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 1575 - 1582
  • [9] SEMUD: Secure Multi-hop Device-to-Device Communication for 5G Public Safety Networks
    Schmittner, Milan
    Asadi, Arash
    Hollick, Matthias
    2017 IFIP NETWORKING CONFERENCE (IFIP NETWORKING) AND WORKSHOPS, 2017,
  • [10] Key Exchange Protocols for Secure Device-to-Device (D2D) Communication in 5G
    Sedidi, Ravindranath
    Kumar, Abhinav
    2016 WIRELESS DAYS (WD), 2016,