A security protocol for D2D communications in 5G networks using elliptic curve cryptography

被引:0
|
作者
R. Kishore
I. Ioannou
C. Christophorou
N. Prabagarane
V. Vassiliou
S. Vignesh
H. Vinayak
S. Venkatesh
A. Pitsillides
机构
[1] Sri Sivasubramaniya Nadar College of Engineering,Department of ECE
[2] University of Cyprus,Department of Computer Science
[3] CYENS - Centre of Excellence,Department of Electrical and Electronic Engineering Science
[4] University of Johannesburg,undefined
关键词
Device-to-device (D2D) communications; Security; Elliptic curve cryptography; Security protocol; D2D;
D O I
暂无
中图分类号
学科分类号
摘要
Advancements in the field of wireless and mobile communication motivate academia, industry, and standardisation organisations to explore new technologies to improve overall efficiency, spectrum utilisation, power consumption, and security. One of the most essential technologies proposed for short-range communications, which will play a key role in 5G wireless networks, is device-to-device (D2D) communications. D2D communication enables direct communication between two devices when they are in close proximity without requiring the help of a fixed infrastructure like base stations. Despite the significant benefits provided by D2D communications, this new networking communication paradigm introduces unique security threats to D2D services that should be solved in order to limit any malicious attacks. Towards this end, in this paper, we focus on secure D2D communications and propose a protocol for establishing secure D2D communication using elliptic curve cryptography. The protocol utilises: (i) specific Mobile Identifiers acquired from the hardware of the mobile phone (i.e. IMEI) and the SIM card (i.e. IMSI, MSISDN) provided by the mobile operator and (ii) the SIM storage for saving private keys or signature data. The proposed security protocol is verified and validated with the help of the Scyther tool, and the performance is evaluated in terms of resiliency analysis.
引用
收藏
页码:1389 / 1408
页数:19
相关论文
共 50 条
  • [21] Handover Management for D2D Communication in 5G Networks
    Lai, Wei Kuang
    Shieh, Chin-Shiuh
    Chou, Fu-Sheng
    Hsu, Chia-Yu
    Shen, Meng-Han
    APPLIED SCIENCES-BASEL, 2020, 10 (12):
  • [22] On One D2D Usage Model for 5G Networks
    Namiot, Dmitry
    Sneps-Sneppe, Manfred
    PROCEEDINGS OF THE 28TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION FRUCT, 2021, : 322 - 327
  • [23] D2D NOMA Groupcast in 5G Heterogeneous Networks
    Kaliski R.
    SN Computer Science, 2021, 2 (5)
  • [24] Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
    Qazi, Rosheen
    Qureshi, Kashif Naseer
    Bashir, Faisal
    Islam, Najam Ul
    Iqbal, Saleem
    Arshad, Arsalan
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) : 547 - 566
  • [25] Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
    Rosheen Qazi
    Kashif Naseer Qureshi
    Faisal Bashir
    Najam Ul Islam
    Saleem Iqbal
    Arsalan Arshad
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 547 - 566
  • [26] Secure D2D Communication for 5G IoT Network Based on Lightweight Cryptography
    Seok, Byoungjin
    Sicato, Jose Costa Sapalo
    Erzhena, Tcydenova
    Xuan, Canshou
    Pan, Yi
    Park, Jong Hyuk
    APPLIED SCIENCES-BASEL, 2020, 10 (01):
  • [27] Energy Efficient Power Allocation for Relay-Aided D2D Communications in 5G Networks
    Ru Wang
    Jia Liu
    Guopeng Zhang
    Shuanghong Huang
    Ming Yuan
    中国通信, 2017, 14 (06) : 54 - 64
  • [28] Energy Efficient Power Allocation for Relay-Aided D2D Communications in 5G Networks
    Wang, Ru
    Liu, Jia
    Zhang, Guopeng
    Huang, Shuanghong
    Yuan, Ming
    CHINA COMMUNICATIONS, 2017, 14 (06) : 54 - 64
  • [29] An energy efficient scheme by exploiting multi-hop D2D communications for 5G networks
    Dubey, Rishav
    Mishra, Pavan Kumar
    Pandey, Sudhakar
    PHYSICAL COMMUNICATION, 2022, 51
  • [30] Delay Efficient D2D Communications over 5G Edge-Computing Mobile Networks
    Xu, Xiaohua
    Chen, Yuanfang
    Zhao, Yanxiao
    He, Shuibing
    Song, Houbing
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON MODELLING, IDENTIFICATION AND CONTROL (ICMIC2019), 2020, 582 : 1249 - 1260