A security protocol for D2D communications in 5G networks using elliptic curve cryptography

被引:0
作者
R. Kishore
I. Ioannou
C. Christophorou
N. Prabagarane
V. Vassiliou
S. Vignesh
H. Vinayak
S. Venkatesh
A. Pitsillides
机构
[1] Sri Sivasubramaniya Nadar College of Engineering,Department of ECE
[2] University of Cyprus,Department of Computer Science
[3] CYENS - Centre of Excellence,Department of Electrical and Electronic Engineering Science
[4] University of Johannesburg,undefined
来源
International Journal of Information Security | 2022年 / 21卷
关键词
Device-to-device (D2D) communications; Security; Elliptic curve cryptography; Security protocol; D2D;
D O I
暂无
中图分类号
学科分类号
摘要
Advancements in the field of wireless and mobile communication motivate academia, industry, and standardisation organisations to explore new technologies to improve overall efficiency, spectrum utilisation, power consumption, and security. One of the most essential technologies proposed for short-range communications, which will play a key role in 5G wireless networks, is device-to-device (D2D) communications. D2D communication enables direct communication between two devices when they are in close proximity without requiring the help of a fixed infrastructure like base stations. Despite the significant benefits provided by D2D communications, this new networking communication paradigm introduces unique security threats to D2D services that should be solved in order to limit any malicious attacks. Towards this end, in this paper, we focus on secure D2D communications and propose a protocol for establishing secure D2D communication using elliptic curve cryptography. The protocol utilises: (i) specific Mobile Identifiers acquired from the hardware of the mobile phone (i.e. IMEI) and the SIM card (i.e. IMSI, MSISDN) provided by the mobile operator and (ii) the SIM storage for saving private keys or signature data. The proposed security protocol is verified and validated with the help of the Scyther tool, and the performance is evaluated in terms of resiliency analysis.
引用
收藏
页码:1389 / 1408
页数:19
相关论文
共 60 条
[1]  
Ansari R(2018)5G D2D Networks: Techniques, Challenges, and Future Prospects IEEE Syst. J. 12 3970-3984
[2]  
Chrysostomou C(2016)Device-to-device communication in cellular networks: a survey J. Netw. Comput. Appl. 71 99-117
[3]  
Hassan S(2020)Distributed artificial intelligence solution for D2D communication in 5G networks IEEE Syst. J. 14 4232-4241
[4]  
Guizani M(2017)Resource management in D2D communication: an optimisation perspective J. Netw. Comput. Appl. 93 51-75
[5]  
Mumtaz S(2017)Security and privacy in device-to-device (D2D) communication: a review IEEE Commun. Surv. Tutor. 19 1054-1079
[6]  
Rodriguez J(2017)A survey on device-to-device (D2D) communication: architecture and security issues J. Netw. Comput. Appl. 78 9-29
[7]  
Rodrigues J(2019)Secure D2D communication for 5G IoT network based on lightweight cryptography Appl. Sci. 10 217-801
[8]  
Gandotra P(2011)A secure key predistribution scheme for WSN using elliptic curve cryptography ETRI J. 33 791-7032
[9]  
Jha R(2020)A secure group-oriented device-to-device authentication protocol for 5G wireless networks IEEE Trans. Wirel. Commun. 19 7021-3647
[10]  
Ioannou I(2017)Privacy-preserving authentication and key agreement protocols for D2D group communications IEEE Trans. Ind. Inform. 14 3637-2672