An AKA protocol for 5G-assisted D2D communication in Out-of-Coverage scenario

被引:0
作者
Borgohain, Ponjit [1 ]
Choudhury, Hiten [1 ]
机构
[1] Cotton Univ, Dept Comp Sci & IT, Gauhati 781001, Assam, India
关键词
D2D; Security; AKA; 5G-assisted; Out-of-Coverage; TO-DEVICE COMMUNICATIONS; AUTHENTICATION; SECURITY; INTERNET; ARCHITECTURE; SCHEMES;
D O I
10.1016/j.jnca.2024.104025
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
5G-assisted Device to Device (D2D) communication can be broadly categorized into three use case scenarios: In Coverage, Relay Coverage, and Out-of Coverage. The main challenge lies in ensuring secure communication in Out-of Coverage scenarios, as in this situation, neither of the two devices is within the 5G network's coverage area. Although several researchers have developed authentication mechanisms for securing D2D communication, most are unsuitable for Out-of Coverage scenarios. Additionally, many of these mechanisms cannot withstand free-riding attacks due to the absence of a trusted entity. In a 5G cellular network, a trust relationship can be established between a registered device and the home network through mutual authentication whenever the former is within the latter's coverage area. Leveraging this trust, this paper proposes a lightweight 5G-assisted authentication protocol for mutual authentication between two communicating devices in Out-of Coverage scenarios. The proposed protocol meets the necessary security goals and mitigates various security attacks, including free-riding attacks. The correctness of the proposed protocol is formally established using the Scyther tool and Random Oracle Model. Furthermore, performance analysis shows that the protocol is efficient in terms of computation overhead, communication overhead and energy consumption compared to similar works in the literature. The computation overhead is found to be 596.12 ms for the Requestor device and 587.26 ms for the Requestee device. The communication overhead is 2720 bits and the total energy consumption for both devices combined is found to be 3016.93 millijoules.
引用
收藏
页数:20
相关论文
共 58 条
[1]  
Abdalla M., Bellare M., Rogaway P., The oracle Diffie-Hellman assumptions and an analysis of DHIES, Topics in Cryptology—CT-RSA 2001: The Cryptographers’ Track At RSA Conference 2001 San Francisco, CA, USA, April 8–12, 2001 Proceedings, pp. 143-158, (2001)
[2]  
Al-Bahri M., Yankovsky A., Borodin A., Kirichek R., Testbed for identify IoT-devices based on digital object architecture, Internet of Things, Smart Spaces, and Next Generation Networks and Systems: 18th International Conference, NEW2AN 2018, and 11th Conference, RuSMART 2018, St. Petersburg, Russia, August 27–29, 2018, Proceedings 18, pp. 129-137, (2018)
[3]  
Alaba F.A., Othman M., Hashem I.A.T., Alotaibi F., Internet of things security: A survey, J. Netw. Comput. Appl., 88, pp. 10-28, (2017)
[4]  
Anon F.A., Group Services and System Aspects
[5]  
Security Aspects
[6]  
Study on the Support of 256-Bit Algorithms for 5G (Release 16): Tech. Report 33.841, (2019)
[7]  
Anon F.A., Universal Mobile Telecommunications System (UMTS),LTE Proximity-based services (ProSe) Stage 2, (2024)
[8]  
Anon F.A., Study on security aspects of enhancement for proximity based services in the 5G System (5GS): Tech. Report 33.847, (2024)
[9]  
Anon F.A., Security architecture and procedures for 5G System: Tech. Report 33.501, (2024)
[10]  
Anon F.A., 5G, Security architecture and procedures for 5G System, (2024)