Authentication and Access Control in 5G Device-to-Device Communication

被引:2
|
作者
Panicker, Jithu Geevargheese [1 ]
Salehi, Ahmad S. [1 ]
Rudolph, Carsten [1 ]
机构
[1] Monash Univ, Fac Informat Technol, Melbourne, Vic, Australia
来源
2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021) | 2021年
关键词
Access Control; Authentication; Device-to-device (D2D) Communication; Internet of Things; Security; Privacy; 5G; PRIVACY;
D O I
10.1109/TrustCom53373.2021.00229
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Device-to-device (D2D) communication is one of the most recent advancements in wireless communication technology. It was introduced in cellular communication technology by the 3rd Generation Partnership Project (3GPP) to lay a foundation for the evolving 5G architecture. It has now emerged as a promising technology for proximate devices. It enables proximate devices to communicate directly without the involvement of a third party network infrastructure. Researchers are analysing various methods to facilitate the smooth integration of D2D communication technology into the existing network system architecture. This paper lists all the different possible modes of operation in D2D communication based on the varying use-case scenarios and highlights the security and privacy requirements for D2D communication. Some of the recent authentication proposals for D2D communication technology are further reviewed, and their security and privacy capabilities are analysed. Apart from authentication, we also reviewed some recent proposals of access control in D2D and highlighted the security issues addressed. We then identified the open issues that prevail in implementing D2D technology in a real-world scenario for future researchers, emphasising the existing authentication and access control techniques in D2D communication.
引用
收藏
页码:1575 / 1582
页数:8
相关论文
共 50 条
  • [41] Integrating the device-to-device communication technology into edge computing: A case study
    Yuan, Peiyan
    Huang, Rong
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (02) : 599 - 608
  • [42] A Comprehensive Review on Device-to-Device Communication Paradigm: Trends, Challenges and Applications
    Chakraborty, Chinmay
    Rodrigues, Joel J. C. P.
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (01) : 185 - 207
  • [43] Decentralized Lattice-Based Device-to-Device Authentication for the Edge-Enabled IoT
    Shahidinejad, Ali
    Abawajy, Jemal
    IEEE SYSTEMS JOURNAL, 2023, 17 (04): : 6623 - 6633
  • [44] A Blockchain-based Key Management Protocol for Secure Device-to-Device Communication in the Internet of Things
    Kandi, Mohamed Ali
    Kouicem, Djamel Eddine
    Lakhlef, Hicham
    Bouabdallah, Abdelmadjid
    Challal, Yacine
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1868 - 1873
  • [45] LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks
    Cao, Jin
    Yan, Zheng
    Ma, Ruhui
    Zhang, Yinghui
    Fu, Yulong
    Li, Hui
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06) : 5329 - 5344
  • [46] Access Control in 5G Communication Networks Using Simple PKI Certificates
    Boubakri, Wided
    Abdallah, Walid
    Boudriga, Noureddine
    2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 2092 - 2097
  • [47] A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems
    Chaudhry, Shehzad Ashraf
    Yahya, Khalid
    Al-Turjman, Fadi
    Yang, Ming-Hour
    IEEE ACCESS, 2020, 8 : 139244 - 139254
  • [48] Token-Based Authentication Framework for 5G MEC Mobile Networks
    Niewolski, Wojciech
    Nowak, Tomasz W.
    Sepczuk, Mariusz
    Kotulski, Zbigniew
    ELECTRONICS, 2021, 10 (14)
  • [49] Modeling and Analysis on Access Control for Device-to-Device Communications in Cellular Network: A Network-Calculus-Based Approach
    Huang, Jun
    Sun, Yi
    Xiong, Zi
    Duan, Qiang
    Zhao, Yanxiao
    Cao, Xianghui
    Wang, Wei
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (03) : 1615 - 1626
  • [50] Lega: A lightweight and efficient group authentication protocol for massive machine type communication in 5g networks
    Basudan S.
    Journal of Communications and Information Networks, 2020, 5 (04) : 89 - 98