Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet

被引:0
|
作者
Sun, Yunqing [1 ]
Cao, Jin [1 ]
Ma, Maode [2 ]
Li, Hui [1 ]
Niu, Ben [3 ]
Li, Fenghua [3 ,4 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian, Shaanxi, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore, Singapore
[3] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[4] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
KEY MANAGEMENT SCHEME; PROTOCOL;
D O I
10.1109/iccnc.2019.8685499
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Device-to-device (D2D) communication as a direct communication technology has many application scenarios and plays a very important role in the 5G era. Using D2D communication in 3GPP 5G Heterogeneous Network (HetNet) can effectively relieve the network traffic pressure and reduce the energy consumption of the base station. However, there are numerous security threats in D2D application since the introduction of D2D communication into the 3GPP 5G HetNet still remains in the early stage. It is urgent to design a mutual authentication and key agreement protocol between two heterogeneous User Equipments (UEs) with privacy preserving and device discovery. The existing standards and solutions rarely take the heterogeneous access scenarios, privacy protection, and device discovery into consideration. In this paper, we propose a unified privacy protection device discovery and authentication mechanism for heterogeneous D2D UEs using the identity-based prefix encryption and ECDH techniques. Our proposed scheme can be applied to all of the 5G heterogeneous access scenarios of D2D communication. The security analysis and performance results show that our scheme can achieve the mutual authentication, key agreement, identity privacy protection and resist several protocols attacks with ideal efficiency.
引用
收藏
页码:425 / 431
页数:7
相关论文
共 50 条
  • [21] D2D Communication-Based Salvage Transmission Scheme for Communication Disturbance in 5G Networks
    Saito, Megumi
    Jiang, Liu
    Pan Zhenni
    Shimamoto, Shigeru
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [22] Device Discovery in D2D Communication: A Survey
    Hayat, Omar
    Ngah, Razali
    Hashim, Siti Zaiton Mohd
    Dahri, Muhammad Hashim
    Malik, Reza Firsandaya
    Rahayu, Yusnita
    IEEE ACCESS, 2019, 7 : 131114 - 131134
  • [23] Handover Management for D2D Communication in 5G Networks
    Lai, Wei Kuang
    Shieh, Chin-Shiuh
    Chou, Fu-Sheng
    Hsu, Chia-Yu
    Shen, Meng-Han
    APPLIED SCIENCES-BASEL, 2020, 10 (12):
  • [24] Blockchain-enabled anonymous mutual authentication and location privacy-preserving scheme for 5G networks
    Haddad, Zaher
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (06)
  • [25] QoS and Service Continuity in 3GPP D2D for IoT and Wearables
    Koziol, Dawid
    Moya, Fernando Sanchez
    Yu, Ling
    Vinh Van Phan
    Xu, Steven
    2017 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), 2017, : 233 - 239
  • [26] On the Design of D2D Synchronization in 3GPP Release-12
    Cannon, Mark J.
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 633 - 638
  • [27] Dynamic group authentication and key agreement protocol for D2D secure communication in 5G networks
    Cheng X.
    Jiang R.
    Pei B.
    Wu S.
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2020, 50 (05): : 918 - 928
  • [28] A Selective Transmission Power Boosting Method for D2D discovery in 3GPP LTE Cellular System
    Song, Ju Hyung
    Lee, Dong Hoon
    Hwang, Won Jun
    Choi, Hyung Jin
    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 267 - 268
  • [29] A survey on interference management for Device-to-Device (D2D) communication and its challenges in 5G networks
    Noura, Manda
    Nordin, Rosdiadee
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 71 : 130 - 150
  • [30] Mutual and Batch Authentication With Conditional Privacy-Preserving Scheme for V2G Communication System
    Subramani, Jegadeesan
    Maria, Azees
    Sekar Rajasekaran, Arun
    Prasad Chapa, Babji
    IEEE ACCESS, 2024, 12 : 69593 - 69602