DOI QR코드

DOI QR Code

Secure Device to Device Communications using Lightweight Cryptographic Protocol

  • Ajith Kumar, V (Department of Computer Applications, RRC, VTU Belguam) ;
  • Reddy, K Satyanarayan (Department of Information Science & Engineering, Cambridge Institute of Technology)
  • 투고 : 2021.11.05
  • 발행 : 2021.11.30

초록

The device to device (D2D) communication is an important and emerging area for future cellular networks. It is concerned about all aspect of secure data transmission between end devices along with originality of the data. In this paradigm, the major concerns are about how keys are delivered between the devices when the devices require the cryptographic keys. Another major concern is how effectively the receiver device verifies the data sent by the sender device which means that the receiver checks the originality of the data. In order to fulfill these requirements, the proposed system able to derive a cryptographic key using a single secret key and these derived keys are securely transmitted to the intended receiver with procedure called mutual authentication. Initially, derived keys are computed by applying robust procedure so that any adversary feel difficulties for cracking the keys. The experimental results shows that both sender and receiver can identify themselves and receiver device will decrypt the data only after verifying the originality of the data. Only the devices which are mutually authenticated each other can interchange the data so that entry of the intruder node at any stage is not possible.

키워드

참고문헌

  1. U. N. Kar and D. K. Sanyal, "A critical review of 3gpp standardization of device-to-device communication in cellular networks," SN Computer Science, vol. 1, no. 1,p. 37, 2020. https://doi.org/10.1007/s42979-019-0045-5
  2. U. N. Kar and D. K. Sanyal, "An overview of device-to-device communication in cellular networks", ICT Express, volume 4, issue 4, December 2018, pages 203-208. https://doi.org/10.1016/j.icte.2017.08.002
  3. M. Wazid, A. K. Das, N. Kumar, and A. V. Vasilakos, "Design of secure key management and user authentication scheme for fog computing services," Future Generation Computer Systems, vol. 91, pp. 475-492,2019. https://doi.org/10.1016/j.future.2018.09.017
  4. A. P. G Lopes and P. R. Gondim, "Mutual authentication protocol for d2d communications in a cloud-based e-health system," Sensors, vol. 20, no. 7, p. 2072, 2020. https://doi.org/10.3390/s20072072
  5. G. S. Gaba, G. Kumar, T.-H. Kim, H. Monga, and P. Kumar, "Secure device-to-device communications for 5g enabled internet of things applications," Computer Communications, vol. 169, pp. 114-128, 2021. https://doi.org/10.1016/j.comcom.2021.01.010
  6. P. Gandotra, R. K. Jha, and S. Jain, "A survey on device-to-device (d2d) communication: Architecture and security issues," Journal of Network and Computer Applications, vol. 78, pp. 9-29, 2017. https://doi.org/10.1016/j.jnca.2016.11.002
  7. M. Haus, M. Waqas, A. Y. Ding, Y. Li, S. Tarkoma, and J. Ott, "Security and privacy in device-to-device (d2d) communication: A review," IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 1054-1079, 2017. https://doi.org/10.1109/COMST.2017.2649687
  8. F. Jameel, Z. Hamid, F. Jabeen, S. Zeadally, and M. A. Javed, "A survey of device-to-device communications: Research issues and challenges," IEEE Communications Surveys & Tutorials, vol. 20, no. 3, pp. 2133- 2168, 2018. https://doi.org/10.1109/COMST.2018.2828120
  9. J. Wang, Y. Huang, S. Jin, R. Schober, X. You, and C. Zhao, "Resource management for device-to-device communication: A physical layer security perspective," IEEE Journal on Selected Areas in Communications, vol. 36, no. 4, pp. 946-960, 2018. https://doi.org/10.1109/jsac.2018.2825484
  10. A. Khan, Y. Javed, J. Abdullah, J. Nazim, and N. Khan, "Security issues in 5g device to device communication," IJCSNS, vol. 17, no. 5, p. 366, 2017.
  11. S. T. Shah, S. F. Hasan, B.-C. Seet, P. H. J. Chong, and M. Y. Chung, "Device-to-device communications: A contemporary survey," Wireless Personal Communications, vol. 98, no. 1, pp. 1247-1284, 2018. https://doi.org/10.1007/s11277-017-4918-4
  12. O. N. Hamoud, T. Kenaza, and Y. Challal, "Security in device-to-device communications: a survey," IET Networks, vol. 7, no. 1, pp. 14-22, 2017. https://doi.org/10.1049/iet-net.2017.0119
  13. Y. Zhang, K. Cheng, F. Khan, R. Alturki, R. Khan, and A. U. Rehman, "A mutual authentication scheme for establishing secure device-to-device communication sessions in the edge-enabled smart cities," Journal of Information Security and Applications, vol. 58, p. 102683, 2021. https://doi.org/10.1016/j.jisa.2020.102683
  14. J. Kim and J. Song, "A secure device-to-device link establishment scheme for lorawan," IEEE Sensors Journal, vol. 18, no. 5, pp. 2153- 2160, 2018. https://doi.org/10.1109/jsen.2017.2789121
  15. M. Waqas, M. Ahmed, Y. Li, D. Jin, and S. Chen, "Social-aware secret key generation for secure device-to-device communication via trusted and non-trusted relays," IEEE Transactions on Wireless Communications, vol. 17, no. 6, pp. 3918-3930, 2018. https://doi.org/10.1109/twc.2018.2817607
  16. R. Amin, S. H. Islam, P. Vijayakumar, M. K. Khan, and V. Chang, "A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication," Multimedia Tools and Applications, vol. 77, no. 9, pp. 11 041-11 066, 2018. https://doi.org/10.1007/s11042-017-4996-z
  17. S. Jegadeesan, M. Azees, P. M. Kumar, G. Manogaran, N. Chilamkurti, R. Varatharajan, and C.-H. Hsu, "An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications," Sustainable Cities and Society, vol. 49, p. 101522, 2019. https://doi.org/10.1016/j.scs.2019.101522
  18. V. Kumar, M. Ahmad, and A. Kumari, "A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted tmis," Telematics and Informatics, vol. 38, pp. 100-117, 2019. https://doi.org/10.1016/j.tele.2018.09.001
  19. M. S. Raniyal, I. Woungang, S. K. Dhurandher, and S. S. Ahmed, "Passphrase protected device-to-device mutual authentication schemes for smart homes," Security and Privacy, vol. 1, no. 3, p. e42, 2018. https://doi.org/10.1002/spy2.42
  20. L. Wu, J. Wang, K.-K. R. Choo, and D. He, "Secure key agreement and key protection for mobile device user authentication," IEEE Transactions on Information Forensics and Security, vol. 14, no. 2, pp. 319-330, 2018. https://doi.org/10.1109/tifs.2018.2850299
  21. M. Wang, Z. Yan, and V. Niemi, "Uaka-d2d: Universal authentication and key agreement protocol in d2d communications," Mobile Networks and Applications, vol. 22, no. 3, pp. 510-525, 2017. https://doi.org/10.1007/s11036-017-0870-5