Authentication and Access Control in 5G Device-to-Device Communication

被引:2
|
作者
Panicker, Jithu Geevargheese [1 ]
Salehi, Ahmad S. [1 ]
Rudolph, Carsten [1 ]
机构
[1] Monash Univ, Fac Informat Technol, Melbourne, Vic, Australia
来源
2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021) | 2021年
关键词
Access Control; Authentication; Device-to-device (D2D) Communication; Internet of Things; Security; Privacy; 5G; PRIVACY;
D O I
10.1109/TrustCom53373.2021.00229
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Device-to-device (D2D) communication is one of the most recent advancements in wireless communication technology. It was introduced in cellular communication technology by the 3rd Generation Partnership Project (3GPP) to lay a foundation for the evolving 5G architecture. It has now emerged as a promising technology for proximate devices. It enables proximate devices to communicate directly without the involvement of a third party network infrastructure. Researchers are analysing various methods to facilitate the smooth integration of D2D communication technology into the existing network system architecture. This paper lists all the different possible modes of operation in D2D communication based on the varying use-case scenarios and highlights the security and privacy requirements for D2D communication. Some of the recent authentication proposals for D2D communication technology are further reviewed, and their security and privacy capabilities are analysed. Apart from authentication, we also reviewed some recent proposals of access control in D2D and highlighted the security issues addressed. We then identified the open issues that prevail in implementing D2D technology in a real-world scenario for future researchers, emphasising the existing authentication and access control techniques in D2D communication.
引用
收藏
页码:1575 / 1582
页数:8
相关论文
共 50 条
  • [31] Distributed Ledger Technology Based Architecture for Decentralized Device-to-Device Communication Network
    Lu, Shu-Ping
    Lei, Chin-Laung
    Ho, Cheng-Yun
    Hwang, Shy-Shang
    Chen, Hsin-Chen
    IEEE ACCESS, 2022, 10 : 92006 - 92022
  • [32] Mutual Authentication Scheme for the Device-to-Server Communication in the Internet of Medical Things
    Sun, Jiangfeng
    Khan, Fazlullah
    Li, Junxia
    Alshehri, Mohammad Dahman
    Alturki, Ryan
    Wedyan, Mohammad
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (21) : 15663 - 15671
  • [33] SEDCOS: A Secure Device-to-Device Communication System for Disaster Scenarios
    Kohnhaeuser, F.
    Stute, M.
    Baumgaertner, L.
    Almon, L.
    Katzenbeisser, S.
    Hollick, M.
    Freisleben, B.
    2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2017, : 195 - 198
  • [34] BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology
    Manojkumar Vivekanandan
    Sastry V. N.
    Srinivasulu Reddy U.
    Peer-to-Peer Networking and Applications, 2021, 14 : 403 - 419
  • [35] A versatile Key Management protocol for secure Group and Device-to-Device Communication in the Internet of Things
    Kandi, Mohamed Ali
    Lakhlef, Hicham
    Bouabdallah, Abdelmadjid
    Challal, Yacine
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 150
  • [36] Access control for the Cloud based on multi-device authentication
    Gonzalez-Manzano, L.
    de Fuentes, J. M.
    Orfila, A.
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 856 - 863
  • [37] PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks
    Muralidhara Rao Patruni
    Abdul Gaffar Humayun
    International Journal of Information Security, 2024, 23 : 679 - 698
  • [38] PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks
    Patruni, Muralidhara Rao
    Humayun, Abdul Gaffar
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (01) : 679 - 698
  • [39] Energy Harvesting Aided Device-to-Device Communication Underlaying the Cellular Downlink
    Gupta, Shruti
    Zhang, Rong
    Hanzo, Lajos
    IEEE ACCESS, 2017, 5 : 7405 - 7413
  • [40] A Comprehensive Review on Device-to-Device Communication Paradigm: Trends, Challenges and Applications
    Chinmay Chakraborty
    Joel J. C. P. Rodrigues
    Wireless Personal Communications, 2020, 114 : 185 - 207