Enhancing Security and Privacy in 5G Device-to-Device Communication: A Secure Gale-Shapley Algorithm Approach

被引:0
|
作者
Alruwaili, Musaad [1 ]
Kim, Junghwan [1 ]
Oluoch, Jared [1 ]
机构
[1] Univ Toledo, Coll Engn, Toledo, OH 43606 USA
来源
IEEE ACCESS | 2025年 / 13卷
关键词
Security; Device-to-device communication; Jamming; 5G mobile communication; Full-duplex system; Encryption; Resource management; Wireless communication; Performance evaluation; Real-time systems; 5G networks; device-to-device communication (D2D); security framework; adaptive jamming; AI-driven threat detection; physical layer security; differential privacy; multi-party computation (MPC); lightweight encryption; resource allocation;
D O I
10.1109/ACCESS.2025.3540745
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Device-to-Device (D2D) communication is pivotal in enhancing the performance of 5G networks by improving spectral efficiency, reducing latency, and supporting applications such as the Internet of Things (IoT). Despite these benefits, direct communication pathways in D2D pose significant security and privacy challenges, such as unauthorized access, data eavesdropping, and privacy breaches. To address these issues, we propose a robust and adaptive security framework that integrates AI-enhanced physical layer key generation, full-duplex adaptive jamming, and differential privacy. Our approach employs secure multi-party computation (MPC) and lightweight encryption to protect user preferences and communication data during resource allocation while ensuring optimal system performance. AI-driven key generation dynamically adapts to changing network conditions, whereas the full-duplex adaptive jamming mechanism effectively counteracts eavesdropping threats. We validated the framework through extensive MATLAB simulations, demonstrating its ability to achieve high throughput and low latency, even in the presence of various security threats. The results confirm the efficacy of the framework in safeguarding D2D communications, making it well suited for mission-critical 5G applications, where both performance and security are paramount.
引用
收藏
页码:30623 / 30635
页数:13
相关论文
共 50 条
  • [31] Robust Device-to-Device 5G Cellular Communication in the Post-Disaster Scenario
    Deepak, G. C.
    Ladas, Alexandros
    Politis, Christos
    2019 16TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2019,
  • [32] Intrusion Detection System for 5G Device-to-Device Communication Technology in Internet of Things
    Malkawi, Ola
    Almobaideen, Wesam
    Obaid, Nadeem
    Hammo, Bassam
    Informatica (Slovenia), 2024, 48 (15): : 191 - 206
  • [33] Architecture and Protocols for Inter-Cell Device-to-Device Communication in 5G Networks
    Murkaz, A.
    Hussain, R.
    Hasan, S. F.
    Chung, M. Y.
    Seet, B. -C.
    Chong, P. H. J.
    Shah, S. T.
    Malik, S. A.
    2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 489 - 492
  • [34] Device-to-Device Communication in 5G Cellular Networks: Challenges, Solutions, and Future Directions
    Tehrani, Mohsen Nader
    Uysal, Murat
    Yanikomeroglu, Halim
    IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (05) : 86 - 92
  • [35] Hybrid Architecture Performance Analysis for Device-to-Device Communication in 5G Cellular Network
    Zhijian Lin
    Zhibin Gao
    Lianfen Huang
    Chi-Yuan Chen
    Han-Chieh Chao
    Mobile Networks and Applications, 2015, 20 : 713 - 724
  • [36] Routing constraints in the device-to-device communication for beyond IoT 5G networks: a review
    S. Malathy
    P. Jayarajan
    M. H. D. Nour Hindia
    Valmik Tilwari
    Kaharudin Dimyati
    Kamarul Ariffin Noordin
    I. S. Amiri
    Wireless Networks, 2021, 27 : 3207 - 3231
  • [37] A Secure Group-Oriented Device-to-Device Authentication Protocol for 5G Wireless Networks
    Shang, Zhengyi
    Ma, Maode
    Li, Xiaohong
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2020, 19 (11) : 7021 - 7032
  • [38] Security and Privacy in Device-to-Device (D2D) Communication: A Review
    Haus, Michael
    Waqas, Muhammad
    Ding, Aaron Yi
    Li, Yong
    Tarkoma, Sasu
    Ott, Jorg
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02): : 1054 - 1079
  • [39] Device to Device Communication over 5G
    Khan, Md. Tabrej
    Adholiya, Ashish
    COMPUTING SCIENCE, COMMUNICATION AND SECURITY, 2022, 1604 : 255 - 273
  • [40] On the Use of Distributed Synchronization in 5G Device-to-Device Networks
    Tetreault-La Roche, David
    Champagne, Benoit
    Psaromiligkos, Ioannis
    Pelletier, Benoit
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,