An AKA protocol for 5G-assisted D2D communication in Out-of-Coverage scenario

被引:1
作者
Borgohain, Ponjit [1 ]
Choudhury, Hiten [1 ]
机构
[1] Cotton Univ, Dept Comp Sci & IT, Gauhati 781001, Assam, India
关键词
D2D; Security; AKA; 5G-assisted; Out-of-Coverage; TO-DEVICE COMMUNICATIONS; AUTHENTICATION; SECURITY; INTERNET; ARCHITECTURE; SCHEMES;
D O I
10.1016/j.jnca.2024.104025
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
5G-assisted Device to Device (D2D) communication can be broadly categorized into three use case scenarios: In Coverage, Relay Coverage, and Out-of Coverage. The main challenge lies in ensuring secure communication in Out-of Coverage scenarios, as in this situation, neither of the two devices is within the 5G network's coverage area. Although several researchers have developed authentication mechanisms for securing D2D communication, most are unsuitable for Out-of Coverage scenarios. Additionally, many of these mechanisms cannot withstand free-riding attacks due to the absence of a trusted entity. In a 5G cellular network, a trust relationship can be established between a registered device and the home network through mutual authentication whenever the former is within the latter's coverage area. Leveraging this trust, this paper proposes a lightweight 5G-assisted authentication protocol for mutual authentication between two communicating devices in Out-of Coverage scenarios. The proposed protocol meets the necessary security goals and mitigates various security attacks, including free-riding attacks. The correctness of the proposed protocol is formally established using the Scyther tool and Random Oracle Model. Furthermore, performance analysis shows that the protocol is efficient in terms of computation overhead, communication overhead and energy consumption compared to similar works in the literature. The computation overhead is found to be 596.12 ms for the Requestor device and 587.26 ms for the Requestee device. The communication overhead is 2720 bits and the total energy consumption for both devices combined is found to be 3016.93 millijoules.
引用
收藏
页数:20
相关论文
共 56 条
[1]  
Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P143
[2]   Testbed for Identify IoT-Devices Based on Digital Object Architecture [J].
Al-Bahri, Mahmood ;
Yankovsky, Anton ;
Borodin, Alexey ;
Kirichek, Ruslan .
INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, NEW2AN 2018, 2018, 11118 :129-137
[3]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[4]  
[Anonymous], 2019, Tech. Report 33.841
[5]  
[Anonymous], 2024, Tech. Report 33.847
[6]  
[Anonymous], 2024, Tech. Specification 33.503
[7]  
[Anonymous], 2024, Tech. Specification 33.536
[8]  
[Anonymous], 2024, Tech. Specification 23.303
[9]  
[Anonymous], 2024, Tech. Report 33.501
[10]   On Advances of Lattice-Based Cryptographic Schemes and Their Implementations [J].
Bandara, Harshana ;
Herath, Yasitha ;
Weerasundara, Thushara ;
Alawatugoda, Janaka .
CRYPTOGRAPHY, 2022, 6 (04)