Authentication and Access Control in 5G Device-to-Device Communication

被引:2
|
作者
Panicker, Jithu Geevargheese [1 ]
Salehi, Ahmad S. [1 ]
Rudolph, Carsten [1 ]
机构
[1] Monash Univ, Fac Informat Technol, Melbourne, Vic, Australia
来源
2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021) | 2021年
关键词
Access Control; Authentication; Device-to-device (D2D) Communication; Internet of Things; Security; Privacy; 5G; PRIVACY;
D O I
10.1109/TrustCom53373.2021.00229
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Device-to-device (D2D) communication is one of the most recent advancements in wireless communication technology. It was introduced in cellular communication technology by the 3rd Generation Partnership Project (3GPP) to lay a foundation for the evolving 5G architecture. It has now emerged as a promising technology for proximate devices. It enables proximate devices to communicate directly without the involvement of a third party network infrastructure. Researchers are analysing various methods to facilitate the smooth integration of D2D communication technology into the existing network system architecture. This paper lists all the different possible modes of operation in D2D communication based on the varying use-case scenarios and highlights the security and privacy requirements for D2D communication. Some of the recent authentication proposals for D2D communication technology are further reviewed, and their security and privacy capabilities are analysed. Apart from authentication, we also reviewed some recent proposals of access control in D2D and highlighted the security issues addressed. We then identified the open issues that prevail in implementing D2D technology in a real-world scenario for future researchers, emphasising the existing authentication and access control techniques in D2D communication.
引用
收藏
页码:1575 / 1582
页数:8
相关论文
共 50 条
  • [21] Universally Secure Device-to-Device Communications With Privacy Protection and Fine-Grained Access Control Based on 5G-Enabled Multi-Access Edge Computing
    Hsu, Ruei-Hau
    Wang, Lu-Chin
    Fan, Hsiang-Shian
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2023, 39 (03) : 507 - 524
  • [22] Access control method for device-to-device communications based on stochastic geometry
    Sun P.
    Chen Y.
    Zhou N.
    Wu X.
    Zhang L.
    Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2019, 41 (03): : 25 - 30
  • [23] Security and Privacy in Device-to-Device (D2D) Communication: A Review
    Haus, Michael
    Waqas, Muhammad
    Ding, Aaron Yi
    Li, Yong
    Tarkoma, Sasu
    Ott, Jorg
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02): : 1054 - 1079
  • [24] An overview of device-to-device communication in cellular networks
    Kar, Udit Narayana
    Sanyal, Debarshi Kumar
    ICT EXPRESS, 2018, 4 (04): : 203 - 208
  • [25] A Key Management Protocol for Secure Device-to-Device Communication in the Internet of Things
    Kandi, Mohamed Ali
    Lakhlef, Hicham
    Bouabdallah, Abdelmadjid
    Challal, Yacine
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [26] Lattice-based device-to-device authentication and key exchange protocol for IoT system
    Sarkar P.
    Nag A.
    International Journal of Information Technology, 2024, 16 (7) : 4167 - 4179
  • [27] EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet
    Sun, Yunqing
    Cao, Jin
    Ma, Maode
    Zhang, Yinghui
    Li, Hui
    Niu, Ben
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 370 - 387
  • [28] MixMesh Zones - Changing Pseudonyms Using Device-to-Device Communication in Mix Zones
    Nitschke, Mirja
    Holler, Philipp
    Hartmann, Lukas
    Kesdogan, Dogan
    SECURE IT SYSTEMS, 2018, 11252 : 38 - 53
  • [29] Security aspects of device-to-device (D2D) networks in wireless communication: a comprehensive survey
    Khan, Angshuman
    Das, Rupayan
    TELECOMMUNICATION SYSTEMS, 2022, 81 (04) : 625 - 642
  • [30] Security aspects of device-to-device (D2D) networks in wireless communication: a comprehensive survey
    Angshuman Khan
    Rupayan Das
    Telecommunication Systems, 2022, 81 : 625 - 642