A security protocol for D2D communications in 5G networks using elliptic curve cryptography

被引:0
|
作者
R. Kishore
I. Ioannou
C. Christophorou
N. Prabagarane
V. Vassiliou
S. Vignesh
H. Vinayak
S. Venkatesh
A. Pitsillides
机构
[1] Sri Sivasubramaniya Nadar College of Engineering,Department of ECE
[2] University of Cyprus,Department of Computer Science
[3] CYENS - Centre of Excellence,Department of Electrical and Electronic Engineering Science
[4] University of Johannesburg,undefined
关键词
Device-to-device (D2D) communications; Security; Elliptic curve cryptography; Security protocol; D2D;
D O I
暂无
中图分类号
学科分类号
摘要
Advancements in the field of wireless and mobile communication motivate academia, industry, and standardisation organisations to explore new technologies to improve overall efficiency, spectrum utilisation, power consumption, and security. One of the most essential technologies proposed for short-range communications, which will play a key role in 5G wireless networks, is device-to-device (D2D) communications. D2D communication enables direct communication between two devices when they are in close proximity without requiring the help of a fixed infrastructure like base stations. Despite the significant benefits provided by D2D communications, this new networking communication paradigm introduces unique security threats to D2D services that should be solved in order to limit any malicious attacks. Towards this end, in this paper, we focus on secure D2D communications and propose a protocol for establishing secure D2D communication using elliptic curve cryptography. The protocol utilises: (i) specific Mobile Identifiers acquired from the hardware of the mobile phone (i.e. IMEI) and the SIM card (i.e. IMSI, MSISDN) provided by the mobile operator and (ii) the SIM storage for saving private keys or signature data. The proposed security protocol is verified and validated with the help of the Scyther tool, and the performance is evaluated in terms of resiliency analysis.
引用
收藏
页码:1389 / 1408
页数:19
相关论文
共 50 条
  • [31] Virtual mesh networking for achieving multi-hop D2D communications in 5G networks
    Huang, Cheng
    Zhai, Bangzhao
    Tang, Aimin
    Wang, Xudong
    AD HOC NETWORKS, 2019, 94
  • [32] The First Experimental SDR Platform for Inband D2D Communications in 5G
    Engelhardt, Max
    Asadi, Arash
    2017 IEEE 25TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2017,
  • [33] Towards Ensuring Reliability of Vehicular Ad Hoc Networks Using a Relay Selection Techniques and D2D Communications in 5G Networks
    Goli-Bidgoli, Salman
    Movahhedinia, Naser
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (03) : 2755 - 2767
  • [34] Towards Ensuring Reliability of Vehicular Ad Hoc Networks Using a Relay Selection Techniques and D2D Communications in 5G Networks
    Salman Goli-Bidgoli
    Naser Movahhedinia
    Wireless Personal Communications, 2020, 114 : 2755 - 2767
  • [35] 5G D2D Networks: Techniques, Challenges, and Future Prospects
    Ansari, Rafay Iqbal
    Chrysostomou, Chrysostomos
    Hassan, Syed Ali
    Guizani, Mohsen
    Mumtaz, Shahid
    Rodriguez, Jonathan
    Rodrigues, Joel J. P. C.
    IEEE SYSTEMS JOURNAL, 2018, 12 (04): : 3970 - 3984
  • [36] Interference Mitigation Strategy for D2D Communication in 5G Networks
    Alotaibi, Sultan
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2023, 13 (04) : 11318 - 11325
  • [37] Analytical SINR for D2D Communication Underlay 5G Networks
    Selmi, Sawsan
    Bouallegue, Ridha
    2020 28TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2020, : 286 - 291
  • [38] Modeling D2D Handover Management in 5G Cellular Networks
    Ouali, Kaouthar
    Kassar, Meriem
    Thi Mai Trang Nguyen
    Sethom, Kaouthar
    Kervella, Brigitte
    2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 196 - 201
  • [39] Dynamic group authentication and key agreement protocol for D2D secure communication in 5G networks
    Cheng X.
    Jiang R.
    Pei B.
    Wu S.
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2020, 50 (05): : 918 - 928
  • [40] D2D Technology Implementation in 5G Network and the Security Aspect: A Review
    Causevic, Samir
    Medic, Adisa
    Brankovic, Nedzad
    TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2021, 10 (02): : 987 - 995