Device-to-device group authentication compatible with 5G AKA protocol

被引:4
|
作者
Braeken, An [1 ]
机构
[1] Vrije Univ Brussel, Dept Engn Technol INDI, Brussels, Belgium
关键词
D2D authentication; 5G AKA protocol; Group key; Anonymity; KEY AGREEMENT PROTOCOL; D2D COMMUNICATION; SECURITY; PRIVACY;
D O I
10.1016/j.comnet.2021.108575
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Device-to-device (D2D) communication in 5G can offload large amounts of data from the core network and offer smaller delays in communication, making advantage of the proximity between the devices. Specific attention should be given to a dedicated authentication process as there are significant challenges with respect to security and privacy. We propose the first anonymous group D2D authentication and key agreement protocol, which can be integrated into the existing 5G-AKA protocol with only a few adaptations. No additional initialization or new implementations of security algorithms are required for the user equipment. After a successful run of the protocol, the devices in the group can derive a secure group key and a secret key shared with each other member of the group. Both from a computational and a communication perspective, the scheme is comparable with state-of-the-art related solutions. Moreover, our proposed scheme satisfies several security features, which are not currently available in the existing schemes in literature.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Device-to-Device Communication for Mobile Multimedia in Emerging 5G Networks
    Liu, Jiajia
    Kato, Nei
    Ujikawa, Hirotaka
    Suzuki, Kenichi
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2016, 12 (05)
  • [22] Comparison of Spectral Efficiency Techniques in Device-to-Device Communication for 5G
    Iqbal, Javed
    Iqbal, Muhammad A.
    Ahmad, Awais
    Khan, Murad
    Qamar, Affaq
    Han, Kijun
    IEEE ACCESS, 2019, 7 : 57440 - 57449
  • [23] Device-To-Device Communication in 5G Environment: Issues, Solutions, and Challenges
    Adnan, Mohd Hirzi
    Ahmad Zukarnain, Zuriati
    SYMMETRY-BASEL, 2020, 12 (11): : 1 - 22
  • [24] 5G device-to-device communication security and multipath routing solutions
    Celik, Aslihan
    Tetzner, Jessica
    Sinha, Koushik
    Matta, John
    APPLIED NETWORK SCIENCE, 2019, 4 (01)
  • [25] Reinforcement learning algorithm for 5G indoor device-to-device communications
    Sreedevi, A. G.
    Rao, T. Rama
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (09):
  • [26] Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication
    Shah, Syed W.
    Syed, Naeem F.
    Shaghaghi, Arash
    Anwar, Adnan
    Baig, Zubair
    Doss, Robin
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1120 - 1127
  • [27] A Robust Device-to-Device Continuous Authentication Protocol for the Internet of Things
    Badhib, Arwa
    Alshehri, Suhair
    Cherif, Asma
    IEEE ACCESS, 2021, 9 : 124768 - 124792
  • [28] Efficient device-to-device discovery and access procedure for 5G cellular network
    Lin, Zhijian
    Du, Liang
    Gao, Zhibin
    Huang, Lianfen
    Du, Xiaojiang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2016, 16 (10): : 1282 - 1289
  • [29] Device-to-Device Based Cooperative Relaying for 5G Network: A Comparative Review
    JIANG Wei
    ZTECommunications, 2017, 15(S1) (S1) : 60 - 66
  • [30] Optimal Resource Allocation Method for Device-to-Device Communication in 5G Networks
    Al-Wesabi, Fahd N.
    Khan, Imran
    Mohammed, Saleem Latteef
    Jameel, Huda Farooq
    Alamgeer, Mohammad
    Al-Sharafi, Ali M.
    Kim, Byung Seo
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (01): : 1 - 15