Secure D2D Communication for 5G IoT Network Based on Lightweight Cryptography

被引:55
作者
Seok, Byoungjin [1 ]
Sicato, Jose Costa Sapalo [1 ]
Erzhena, Tcydenova [1 ]
Xuan, Canshou [1 ]
Pan, Yi [2 ]
Park, Jong Hyuk [1 ]
机构
[1] Seoul Natl Univ Sci & Technol, Dept Comp Sci & Engn, Gongneung Ro, Seoul 01811, South Korea
[2] Georgia State Univ, Dept Comp Sci, Atlanta, GA 30302 USA
来源
APPLIED SCIENCES-BASEL | 2020年 / 10卷 / 01期
关键词
D2D communication; 5G IoT network; lightweight cryptography; authentication;
D O I
10.3390/app10010217
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Device-to-device (D2D) communication is a direct means of communication between devices without an intermediate node, and it helps to expand cell coverage and to increase radio frequency reuse in a 5G network. Moreover, D2D communication is a core technology of 5G vehicle-to-everything (V2X) communication, which is an essential technology for autonomous driving. However, typical D2D communication in an 4G network which is typical telecommunication network has various security challenges including impersonation, eavesdropping, privacy sniffing, free-riding attack, etc. Moreover, when IoT technology emerges with 5G networks in massive machine type communication (mMTC) and ultra-reliable low latency communication (URLLC) application scenarios, these security challenges are more crucial and harder to mitigate because of the resource-constrained nature of IoT devices. To solve the security challenges in a 5G IoT environment, we need a lightweight and secure D2D communication system that can provide secure authentication, data confidentiality/integrity and anonymity. In this paper, we survey and analyze existing results about secure D2D communication systems in terms of their security considerations and limitations. Then, we lastly propose a secure D2D communication system to address the aforementioned security challenges and the limitations of the existing results. The proposed secure D2D communication was designed based on elliptic curve cryptography (ECC) and lightweight authenticated encryption with associated data (AEAD) ciphers to cover resource-constrained IoT devices.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks
    Cao, Jin
    Yan, Zheng
    Ma, Ruhui
    Zhang, Yinghui
    Fu, Yulong
    Li, Hui
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06) : 5329 - 5344
  • [42] An Efficient and Fault-Tolerant Privacy-Preserving D2D Group Communication
    Chien, Hung-Yu
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2021, 22 (07): : 1517 - 1530
  • [43] Threshold Cryptography-Based Secure Vehicle-to-Everything (V2X) Communication in 5G-Enabled Intelligent Transportation Systems
    Weerasinghe, Nuwan
    Usman, Muhammad Arslan
    Hewage, Chaminda
    Pfluegel, Eckhard
    Politis, Christos
    [J]. FUTURE INTERNET, 2023, 15 (05):
  • [44] Group Anonymous D2D Communication with End-to-End Security in LTE-A
    Hsu, Ruei-Hau
    Lee, Jemin
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 451 - 459
  • [45] Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication
    Chien, Hung-Yu
    [J]. ELECTRONICS, 2021, 10 (07)
  • [46] Secure and Efficient AKA Scheme and Uniform Handover Protocol for 5G Network Using Blockchain
    Haddad, Zaher
    Baza, Mohamed
    Mahmoud, Mohamed M. E. A.
    Alasmary, Waleed
    Alsolami, Fawaz
    [J]. IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2021, 2 : 2616 - 2627
  • [47] Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks
    Rajasoundaran, S.
    Prabu, A., V
    Routray, Sidheswar
    Malla, Prince Priya
    Kumar, G. Sateesh
    Mukherjee, Amrit
    Qi, Yinan
    [J]. COMPUTER COMMUNICATIONS, 2022, 187 : 71 - 82
  • [48] IBOOST: A Lightweight Provably Secure Identity-Based Online/Offline Signature Technique Based on FCM for Massive Devices in 5G Wireless Sensor Networks
    Meshram, Chandrashekhar
    Imoize, Agbotiname Lucky
    Elhassouny, Azeddine
    Aljaedi, Amer
    Alharbi, Adel R.
    Jamal, Sajjad Shaukat
    [J]. IEEE ACCESS, 2021, 9 : 131336 - 131347
  • [49] A Construction of Security Enhanced and Efficient Handover AKA Protocol in 5G Communication Network
    Sharma, Aditya
    Sharma, Ila
    Jain, Aaditya
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [50] A Secure Blockchain-based Authentication and Key Agreement Protocol for 5G Roaming
    Yadav, Awaneesh Kumar
    Misra, Manoj
    Braeken, An
    Liyanage, Madhusanka
    [J]. 2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1324 - 1331