Device-to-device group authentication compatible with 5G AKA protocol

被引:4
|
作者
Braeken, An [1 ]
机构
[1] Vrije Univ Brussel, Dept Engn Technol INDI, Brussels, Belgium
关键词
D2D authentication; 5G AKA protocol; Group key; Anonymity; KEY AGREEMENT PROTOCOL; D2D COMMUNICATION; SECURITY; PRIVACY;
D O I
10.1016/j.comnet.2021.108575
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Device-to-device (D2D) communication in 5G can offload large amounts of data from the core network and offer smaller delays in communication, making advantage of the proximity between the devices. Specific attention should be given to a dedicated authentication process as there are significant challenges with respect to security and privacy. We propose the first anonymous group D2D authentication and key agreement protocol, which can be integrated into the existing 5G-AKA protocol with only a few adaptations. No additional initialization or new implementations of security algorithms are required for the user equipment. After a successful run of the protocol, the devices in the group can derive a secure group key and a secret key shared with each other member of the group. Both from a computational and a communication perspective, the scheme is comparable with state-of-the-art related solutions. Moreover, our proposed scheme satisfies several security features, which are not currently available in the existing schemes in literature.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] A Secure Group-Oriented Device-to-Device Authentication Protocol for 5G Wireless Networks
    Shang, Zhengyi
    Ma, Maode
    Li, Xiaohong
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2020, 19 (11) : 7021 - 7032
  • [2] Authentication and Access Control in 5G Device-to-Device Communication
    Panicker, Jithu Geevargheese
    Salehi, Ahmad S.
    Rudolph, Carsten
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 1575 - 1582
  • [3] A Robust Device-to-Device Continuous Authentication Protocol for the Internet of Things
    Badhib, Arwa
    Alshehri, Suhair
    Cherif, Asma
    IEEE ACCESS, 2021, 9 : 124768 - 124792
  • [4] Device-To-Device Communication in 5G Environment: Issues, Solutions, and Challenges
    Adnan, Mohd Hirzi
    Ahmad Zukarnain, Zuriati
    SYMMETRY-BASEL, 2020, 12 (11): : 1 - 22
  • [5] A USIM compatible 5G AKA protocol with perfect forward secrecy
    Arkko, Jari
    Norrman, Karl
    Naslund, Mats
    Sahlin, Bengt
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1205 - 1209
  • [6] Formal Verification of Authentication and Service Authorization Protocols in 5G-Enabled Device-to-Device Communications Using ProVerif
    Edris, Ed Kamya Kiyemba
    Aiash, Mahdi
    Loo, Jonathan
    ELECTRONICS, 2021, 10 (13)
  • [7] CAKE: Compatible Authentication and Key Exchange Protocol for a Smart City in 5G Networks
    Chuang, Yun-Hsin
    Tseng, Yuh-Min
    SYMMETRY-BASEL, 2021, 13 (04):
  • [8] A Blockchain-Based Authentication and Key Agreement (AKA) Protocol for 5G Networks
    Hojjati, Maede
    Shafieinejad, Alireza
    Yanikomeroglu, Halim
    IEEE ACCESS, 2020, 8 (08): : 216461 - 216476
  • [9] Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability
    Braeken, An
    COMPUTER NETWORKS, 2020, 181
  • [10] Secure Device-to-Device communications for 5G enabled Internet of Things applications
    Gaba, Gurjot Singh
    Kumar, Gulshan
    Kim, Tai-Hoon
    Monga, Himanshu
    Kumar, Pardeep
    COMPUTER COMMUNICATIONS, 2021, 169 : 114 - 128