Authentication and Access Control in 5G Device-to-Device Communication

被引:2
|
作者
Panicker, Jithu Geevargheese [1 ]
Salehi, Ahmad S. [1 ]
Rudolph, Carsten [1 ]
机构
[1] Monash Univ, Fac Informat Technol, Melbourne, Vic, Australia
关键词
Access Control; Authentication; Device-to-device (D2D) Communication; Internet of Things; Security; Privacy; 5G; PRIVACY;
D O I
10.1109/TrustCom53373.2021.00229
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Device-to-device (D2D) communication is one of the most recent advancements in wireless communication technology. It was introduced in cellular communication technology by the 3rd Generation Partnership Project (3GPP) to lay a foundation for the evolving 5G architecture. It has now emerged as a promising technology for proximate devices. It enables proximate devices to communicate directly without the involvement of a third party network infrastructure. Researchers are analysing various methods to facilitate the smooth integration of D2D communication technology into the existing network system architecture. This paper lists all the different possible modes of operation in D2D communication based on the varying use-case scenarios and highlights the security and privacy requirements for D2D communication. Some of the recent authentication proposals for D2D communication technology are further reviewed, and their security and privacy capabilities are analysed. Apart from authentication, we also reviewed some recent proposals of access control in D2D and highlighted the security issues addressed. We then identified the open issues that prevail in implementing D2D technology in a real-world scenario for future researchers, emphasising the existing authentication and access control techniques in D2D communication.
引用
收藏
页码:1575 / 1582
页数:8
相关论文
共 50 条
  • [21] Reliability Optimization in Narrowband Device-to-Device Communication for 5G and Beyond-5G Networks
    Nauman, Ali
    Jamshed, Muhammad Ali
    Qadri, Yazdan Ahmad
    Ali, Rashid
    Kim, Sung Won
    IEEE ACCESS, 2021, 9 : 157584 - 157596
  • [22] A Secure Group-Oriented Device-to-Device Authentication Protocol for 5G Wireless Networks
    Shang, Zhengyi
    Ma, Maode
    Li, Xiaohong
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2020, 19 (11) : 7021 - 7032
  • [23] Hybrid Architecture Performance Analysis for Device-to-Device Communication in 5G Cellular Network
    Lin, Zhijian
    Gao, Zhibin
    Huang, Lianfen
    Chen, Chi-Yuan
    Chao, Han-Chieh
    MOBILE NETWORKS & APPLICATIONS, 2015, 20 (06): : 713 - 724
  • [24] A Social-Aware Resource Allocation for 5G Device-to-Device Multicast Communication
    Zhao, Pan
    Feng, Lei
    Yu, Peng
    Li, Wenjing
    Qiu, Xuesong
    IEEE ACCESS, 2017, 5 : 15717 - 15730
  • [25] Power Control Schemes for Device-to-Device Communications in 5G Mobile network
    Iliev, T. B.
    Mihaylov, Gr. Y.
    Ivanova, E. P.
    Stoyanov, I. S.
    2017 40TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2017, : 416 - 419
  • [26] Dynamic Resource Allocation for 5G Device-to-Device Communication Based on Expected SARSA
    Wanniarachchi, Shashini Thamarasie
    Turau, Volker
    NETWORKED SYSTEMS, NETYS 2024, 2024, 14783 : 231 - 246
  • [27] Routing constraints in the device-to-device communication for beyond IoT 5G networks: a review
    Malathy, S.
    Jayarajan, P.
    Hindia, M. H. D. Nour
    Tilwari, Valmik
    Dimyati, Kaharudin
    Noordin, Kamarul Ariffin
    Amiri, I. S.
    WIRELESS NETWORKS, 2021, 27 (05) : 3207 - 3231
  • [28] Robust Device-to-Device 5G Cellular Communication in the Post-Disaster Scenario
    Deepak, G. C.
    Ladas, Alexandros
    Politis, Christos
    2019 16TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2019,
  • [29] Intrusion Detection System for 5G Device-to-Device Communication Technology in Internet of Things
    Malkawi, Ola
    Almobaideen, Wesam
    Obaid, Nadeem
    Hammo, Bassam
    Informatica (Slovenia), 2024, 48 (15): : 191 - 206
  • [30] Architecture and Protocols for Inter-Cell Device-to-Device Communication in 5G Networks
    Murkaz, A.
    Hussain, R.
    Hasan, S. F.
    Chung, M. Y.
    Seet, B. -C.
    Chong, P. H. J.
    Shah, S. T.
    Malik, S. A.
    2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 489 - 492