Secure D2D Communication for 5G IoT Network Based on Lightweight Cryptography

被引:55
|
作者
Seok, Byoungjin [1 ]
Sicato, Jose Costa Sapalo [1 ]
Erzhena, Tcydenova [1 ]
Xuan, Canshou [1 ]
Pan, Yi [2 ]
Park, Jong Hyuk [1 ]
机构
[1] Seoul Natl Univ Sci & Technol, Dept Comp Sci & Engn, Gongneung Ro, Seoul 01811, South Korea
[2] Georgia State Univ, Dept Comp Sci, Atlanta, GA 30302 USA
来源
APPLIED SCIENCES-BASEL | 2020年 / 10卷 / 01期
关键词
D2D communication; 5G IoT network; lightweight cryptography; authentication;
D O I
10.3390/app10010217
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Device-to-device (D2D) communication is a direct means of communication between devices without an intermediate node, and it helps to expand cell coverage and to increase radio frequency reuse in a 5G network. Moreover, D2D communication is a core technology of 5G vehicle-to-everything (V2X) communication, which is an essential technology for autonomous driving. However, typical D2D communication in an 4G network which is typical telecommunication network has various security challenges including impersonation, eavesdropping, privacy sniffing, free-riding attack, etc. Moreover, when IoT technology emerges with 5G networks in massive machine type communication (mMTC) and ultra-reliable low latency communication (URLLC) application scenarios, these security challenges are more crucial and harder to mitigate because of the resource-constrained nature of IoT devices. To solve the security challenges in a 5G IoT environment, we need a lightweight and secure D2D communication system that can provide secure authentication, data confidentiality/integrity and anonymity. In this paper, we survey and analyze existing results about secure D2D communication systems in terms of their security considerations and limitations. Then, we lastly propose a secure D2D communication system to address the aforementioned security challenges and the limitations of the existing results. The proposed secure D2D communication was designed based on elliptic curve cryptography (ECC) and lightweight authenticated encryption with associated data (AEAD) ciphers to cover resource-constrained IoT devices.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Lightweight and secure D2D group communication for wireless IoT
    Miao, Junfeng
    Wang, Zhaoshun
    Xue, Xingsi
    Wang, Mei
    Lv, Jianhui
    Li, Min
    FRONTIERS IN PHYSICS, 2023, 11
  • [2] A Disaster Response Framework Based on IoT and D2D Communication under 5G Network Technology
    Ahmed, Shakil
    Rashid, Mohammad
    Alam, Fakhrul
    Fakhruddin, Bapon
    2019 29TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2019,
  • [3] MBMQA: A Multicriteria-Aware Routing Approach for the IoT 5G Network Based on D2D Communication
    Tilwari, Valmik
    Hindia, M. H. D. Nour
    Dimyati, Kaharudin
    Jayakody, Dushantha Nalin K.
    Solanki, Sourabh
    Sinha, Rashmi Sharan
    Hanafi, Effariza
    ELECTRONICS, 2021, 10 (23)
  • [4] Optimal D2D power for secure D2D communication with random eavesdropper in 5G-IoT networks
    Chandra, Saurabh
    Arya, Rajeev
    Singh, Maheshwari Prasad
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (09):
  • [5] Interference Mitigation Methods for D2D Communication in 5G Network
    Sarma, Subhra S.
    Hazra, Ranjay
    COGNITIVE INFORMATICS AND SOFT COMPUTING, 2020, 1040 : 521 - 530
  • [6] Interference Management of D2D Communication in 5G Cellular Network
    Alzoubi, Kifah Hussein
    Bin Roslee, Mardeni
    Elgamati, Mohamed Ahmed A.
    2019 SYMPOSIUM ON FUTURE TELECOMMUNICATION TECHNOLOGIES (SOFTT 2019), VOL 1, 2019,
  • [7] An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
    Mohseni-Ejiyeh, Atefeh
    Ashouri-Talouki, Maede
    Mahdavi, Mojtaba
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 10 (01): : 15 - 27
  • [8] Research on power control of D2D communication system in 5G network
    Jiang B.
    Wu S.-B.
    Wang J.-L.
    Journal of Computers (Taiwan), 2018, 29 (06) : 111 - 120
  • [9] Analysis of Key Establishment Techniques for Secure D2D Communication in 5G Cellular Networks
    Butt, Amir Aziz
    Chughta, Gohar Rehman
    Kabir, Asif
    Mahmood, Zahid
    Jaffri, Zain ul Abidin
    Olah, Judit
    ACTA MONTANISTICA SLOVACA, 2021, 26 (03) : 395 - 403
  • [10] Key Exchange Protocols for Secure Device-to-Device (D2D) Communication in 5G
    Sedidi, Ravindranath
    Kumar, Abhinav
    2016 WIRELESS DAYS (WD), 2016,