A security protocol for D2D communications in 5G networks using elliptic curve cryptography

被引:0
作者
R. Kishore
I. Ioannou
C. Christophorou
N. Prabagarane
V. Vassiliou
S. Vignesh
H. Vinayak
S. Venkatesh
A. Pitsillides
机构
[1] Sri Sivasubramaniya Nadar College of Engineering,Department of ECE
[2] University of Cyprus,Department of Computer Science
[3] CYENS - Centre of Excellence,Department of Electrical and Electronic Engineering Science
[4] University of Johannesburg,undefined
来源
International Journal of Information Security | 2022年 / 21卷
关键词
Device-to-device (D2D) communications; Security; Elliptic curve cryptography; Security protocol; D2D;
D O I
暂无
中图分类号
学科分类号
摘要
Advancements in the field of wireless and mobile communication motivate academia, industry, and standardisation organisations to explore new technologies to improve overall efficiency, spectrum utilisation, power consumption, and security. One of the most essential technologies proposed for short-range communications, which will play a key role in 5G wireless networks, is device-to-device (D2D) communications. D2D communication enables direct communication between two devices when they are in close proximity without requiring the help of a fixed infrastructure like base stations. Despite the significant benefits provided by D2D communications, this new networking communication paradigm introduces unique security threats to D2D services that should be solved in order to limit any malicious attacks. Towards this end, in this paper, we focus on secure D2D communications and propose a protocol for establishing secure D2D communication using elliptic curve cryptography. The protocol utilises: (i) specific Mobile Identifiers acquired from the hardware of the mobile phone (i.e. IMEI) and the SIM card (i.e. IMSI, MSISDN) provided by the mobile operator and (ii) the SIM storage for saving private keys or signature data. The proposed security protocol is verified and validated with the help of the Scyther tool, and the performance is evaluated in terms of resiliency analysis.
引用
收藏
页码:1389 / 1408
页数:19
相关论文
共 60 条
[11]  
Vassiliou V(2016)SeDS: secure data sharing strategy for D2D communication in LTE-advanced networks IEEE Trans. Veh. Technol. 65 2659-22
[12]  
Christophorou C(2018)Security in device-to-device communications: a survey IET Netw. 7 14-92
[13]  
Pitsillides A(2014)Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions IEEE Commun. Mag. 52 86-2025
[14]  
Ahmad M(2020)A review of user authentication model for online banking system based on mobile IMEI number IOP Conf. Ser. Mater. Sci. Eng. 54 2007-undefined
[15]  
Azam M(2008)Provably secure constant round contributory group key agreement in dynamic setting IEEE Trans. Inf. Theory undefined undefined-undefined
[16]  
Naeem M(undefined)undefined undefined undefined undefined-undefined
[17]  
Iqbal M(undefined)undefined undefined undefined undefined-undefined
[18]  
Anpalagan A(undefined)undefined undefined undefined undefined-undefined
[19]  
Haneef M(undefined)undefined undefined undefined undefined-undefined
[20]  
Haus M(undefined)undefined undefined undefined undefined-undefined