Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet

被引:0
|
作者
Sun, Yunqing [1 ]
Cao, Jin [1 ]
Ma, Maode [2 ]
Li, Hui [1 ]
Niu, Ben [3 ]
Li, Fenghua [3 ,4 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian, Shaanxi, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore, Singapore
[3] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[4] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
KEY MANAGEMENT SCHEME; PROTOCOL;
D O I
10.1109/iccnc.2019.8685499
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Device-to-device (D2D) communication as a direct communication technology has many application scenarios and plays a very important role in the 5G era. Using D2D communication in 3GPP 5G Heterogeneous Network (HetNet) can effectively relieve the network traffic pressure and reduce the energy consumption of the base station. However, there are numerous security threats in D2D application since the introduction of D2D communication into the 3GPP 5G HetNet still remains in the early stage. It is urgent to design a mutual authentication and key agreement protocol between two heterogeneous User Equipments (UEs) with privacy preserving and device discovery. The existing standards and solutions rarely take the heterogeneous access scenarios, privacy protection, and device discovery into consideration. In this paper, we propose a unified privacy protection device discovery and authentication mechanism for heterogeneous D2D UEs using the identity-based prefix encryption and ECDH techniques. Our proposed scheme can be applied to all of the 5G heterogeneous access scenarios of D2D communication. The security analysis and performance results show that our scheme can achieve the mutual authentication, key agreement, identity privacy protection and resist several protocols attacks with ideal efficiency.
引用
收藏
页码:425 / 431
页数:7
相关论文
共 50 条
  • [31] Energy efficient resource and power allocation for uplink underlay D2D communication in HetNet-based 5G network
    Rajkumar Nagarajan
    Noor Mohammed Vali Mohamad
    EURASIP Journal on Wireless Communications and Networking, 2025 (1)
  • [32] Device Discovery in D2D Communication: Scenarios and Challenges
    Iqbal, Adeel
    Nauman, Ali
    Hussain, Riaz
    Khan, Irfan Latif
    Khaqan, Ali
    Shuja, Sana
    Kim, Sung Won
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (01): : 1735 - 1750
  • [33] Security and Privacy in Device-to-Device (D2D) Communication: A Review
    Haus, Michael
    Waqas, Muhammad
    Ding, Aaron Yi
    Li, Yong
    Tarkoma, Sasu
    Ott, Jorg
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02): : 1054 - 1079
  • [34] Multihop D2D Communication to Minimize and Balance SAR in 5G
    Das, Avirup
    Das, Nabanita
    2020 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2020,
  • [35] A Decentralize Algorithm for Perturbation Minimization in 5G D2D Communication
    Ghosal, Subhankar
    Ghosh, Sasthi C.
    2019 15TH ANNUAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES (WONS), 2019, : 72 - 78
  • [36] Interference Mitigation Methods for D2D Communication in 5G Network
    Sarma, Subhra S.
    Hazra, Ranjay
    COGNITIVE INFORMATICS AND SOFT COMPUTING, 2020, 1040 : 521 - 530
  • [37] Design and Implementation of an Algorithm in 5G via D2D Communication
    Tayade, Payal P.
    Peroumal, Vijayakumar
    SMART TRENDS IN COMPUTING AND COMMUNICATIONS, VOL 2, SMARTCOM 2024, 2024, 946 : 419 - 428
  • [38] Interference Mitigation Strategy for D2D Communication in 5G Networks
    Alotaibi, Sultan
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2023, 13 (04) : 11318 - 11325
  • [39] Interference Management of D2D Communication in 5G Cellular Network
    Alzoubi, Kifah Hussein
    Bin Roslee, Mardeni
    Elgamati, Mohamed Ahmed A.
    2019 SYMPOSIUM ON FUTURE TELECOMMUNICATION TECHNOLOGIES (SOFTT 2019), VOL 1, 2019,
  • [40] Analytical SINR for D2D Communication Underlay 5G Networks
    Selmi, Sawsan
    Bouallegue, Ridha
    2020 28TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2020, : 286 - 291