An Anonymous and Secure Data Transmission Mechanism With Trajectory Tracking for D2D Relay Communication in 3GPP 5G Networks

被引:0
作者
Sun, Yunqing [1 ]
Cao, Jin [1 ]
Ren, Xiongpeng [1 ]
Tang, Canhui [1 ]
Niu, Ben [2 ]
Zhang, Yinghui [3 ]
Li, Hui [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[3] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Peoples R China
基金
中国国家自然科学基金;
关键词
Relays; Device-to-device communication; Security; Data communication; 5G mobile communication; Authentication; Protocols; D2D; 5G; relay data transmission; authentication; trajectory tracking; Chebyshev polynomial; AUTHENTICATION PROTOCOL;
D O I
10.1109/TITS.2024.3368335
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Device-to-device (D2D) communication, as a traffic offloading technology in the fifth-generation (5G) network, can be widely used in several scenarios to provide 5G characteristics of higher speed, lower latency, and larger capacity. D2D data transmission over wireless channels among mobile devices is vulnerable to security threats and privacy violations from third parties and relay nodes. However, academia and industry have yet to propose relevant schemes or standards for D2D relay data transmission scenarios. We first propose a generic construction for D2D relay communication in this paper. Then, a concrete anonymous and secure D2D data transmission scheme with trajectory tracking is presented based on Chebyshev polynomials, hash-based message authentication code, and symmetric encryption. We employ a formal verification tool - Tamarin, modal logic analysis - BAN logic, and informal security analysis to demonstrate the security features of the proposed scheme. The performance evaluation shows that the proposed scheme can achieve desirable efficiency compared with other related schemes. Finally, we developed an APP, 'D2DWatchmen', to simulate the whole protocol and test its robustness and real execution time, where the result shows good availability and effectiveness.
引用
收藏
页码:9733 / 9748
页数:16
相关论文
共 42 条
[1]   Secure Device-to-Device Communication in LTE-A [J].
Alam, Muhammad ;
Yang, Du ;
Rodriguez, Jonathan ;
Abd-Alhameed, Raed A. .
IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (04) :66-73
[2]  
[Anonymous], 2021, Standard 3GPP TS 33.536 V16.4.0
[3]  
[Anonymous], 2019, Standard 3GPP TS 33.210 V16.2.0, 3rd Generation Partnership Project
[4]  
[Anonymous], 2016, 80057
[5]  
[Anonymous], 2019, Standard 3GPP TR 22.842 V17.2.0, 3rd Generation Partnership Project
[6]  
[Anonymous], 2021, 3GPP TS 22.261
[7]  
[Anonymous], 2019, Standard 3GPP TS 33.501 V16.1.0, 3rd Generation Partnership Project
[8]  
[Anonymous], 2023, Standard 3GPP TS 23.304 V18.2.0, 3rd Generation Partnership Project
[9]  
[Anonymous], 2021, Standard 3GPP TS 22.278 V17.2.0
[10]  
[Anonymous], 2018, Standard 3GPP TS 33.303 V15.0.0, 3rd Generation Partnership Project