Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2021.21.11.48

Secure Device to Device Communications using Lightweight Cryptographic Protocol  

Ajith Kumar, V (Department of Computer Applications, RRC, VTU Belguam)
Reddy, K Satyanarayan (Department of Information Science & Engineering, Cambridge Institute of Technology)
Publication Information
International Journal of Computer Science & Network Security / v.21, no.11, 2021 , pp. 354-362 More about this Journal
Abstract
The device to device (D2D) communication is an important and emerging area for future cellular networks. It is concerned about all aspect of secure data transmission between end devices along with originality of the data. In this paradigm, the major concerns are about how keys are delivered between the devices when the devices require the cryptographic keys. Another major concern is how effectively the receiver device verifies the data sent by the sender device which means that the receiver checks the originality of the data. In order to fulfill these requirements, the proposed system able to derive a cryptographic key using a single secret key and these derived keys are securely transmitted to the intended receiver with procedure called mutual authentication. Initially, derived keys are computed by applying robust procedure so that any adversary feel difficulties for cracking the keys. The experimental results shows that both sender and receiver can identify themselves and receiver device will decrypt the data only after verifying the originality of the data. Only the devices which are mutually authenticated each other can interchange the data so that entry of the intruder node at any stage is not possible.
Keywords
Confidentiality; Device to Device communication; Data integrity; Key derivation; Key robustness; Mutual authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. Gandotra, R. K. Jha, and S. Jain, "A survey on device-to-device (d2d) communication: Architecture and security issues," Journal of Network and Computer Applications, vol. 78, pp. 9-29, 2017.   DOI
2 F. Jameel, Z. Hamid, F. Jabeen, S. Zeadally, and M. A. Javed, "A survey of device-to-device communications: Research issues and challenges," IEEE Communications Surveys & Tutorials, vol. 20, no. 3, pp. 2133- 2168, 2018.   DOI
3 J. Wang, Y. Huang, S. Jin, R. Schober, X. You, and C. Zhao, "Resource management for device-to-device communication: A physical layer security perspective," IEEE Journal on Selected Areas in Communications, vol. 36, no. 4, pp. 946-960, 2018.   DOI
4 A. Khan, Y. Javed, J. Abdullah, J. Nazim, and N. Khan, "Security issues in 5g device to device communication," IJCSNS, vol. 17, no. 5, p. 366, 2017.
5 S. T. Shah, S. F. Hasan, B.-C. Seet, P. H. J. Chong, and M. Y. Chung, "Device-to-device communications: A contemporary survey," Wireless Personal Communications, vol. 98, no. 1, pp. 1247-1284, 2018.   DOI
6 O. N. Hamoud, T. Kenaza, and Y. Challal, "Security in device-to-device communications: a survey," IET Networks, vol. 7, no. 1, pp. 14-22, 2017.   DOI
7 J. Kim and J. Song, "A secure device-to-device link establishment scheme for lorawan," IEEE Sensors Journal, vol. 18, no. 5, pp. 2153- 2160, 2018.   DOI
8 R. Amin, S. H. Islam, P. Vijayakumar, M. K. Khan, and V. Chang, "A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication," Multimedia Tools and Applications, vol. 77, no. 9, pp. 11 041-11 066, 2018.   DOI
9 U. N. Kar and D. K. Sanyal, "A critical review of 3gpp standardization of device-to-device communication in cellular networks," SN Computer Science, vol. 1, no. 1,p. 37, 2020.   DOI
10 M. S. Raniyal, I. Woungang, S. K. Dhurandher, and S. S. Ahmed, "Passphrase protected device-to-device mutual authentication schemes for smart homes," Security and Privacy, vol. 1, no. 3, p. e42, 2018.   DOI
11 U. N. Kar and D. K. Sanyal, "An overview of device-to-device communication in cellular networks", ICT Express, volume 4, issue 4, December 2018, pages 203-208.   DOI
12 M. Haus, M. Waqas, A. Y. Ding, Y. Li, S. Tarkoma, and J. Ott, "Security and privacy in device-to-device (d2d) communication: A review," IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 1054-1079, 2017.   DOI
13 M. Wazid, A. K. Das, N. Kumar, and A. V. Vasilakos, "Design of secure key management and user authentication scheme for fog computing services," Future Generation Computer Systems, vol. 91, pp. 475-492,2019.   DOI
14 A. P. G Lopes and P. R. Gondim, "Mutual authentication protocol for d2d communications in a cloud-based e-health system," Sensors, vol. 20, no. 7, p. 2072, 2020.   DOI
15 G. S. Gaba, G. Kumar, T.-H. Kim, H. Monga, and P. Kumar, "Secure device-to-device communications for 5g enabled internet of things applications," Computer Communications, vol. 169, pp. 114-128, 2021.   DOI
16 S. Jegadeesan, M. Azees, P. M. Kumar, G. Manogaran, N. Chilamkurti, R. Varatharajan, and C.-H. Hsu, "An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications," Sustainable Cities and Society, vol. 49, p. 101522, 2019.   DOI
17 V. Kumar, M. Ahmad, and A. Kumari, "A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted tmis," Telematics and Informatics, vol. 38, pp. 100-117, 2019.   DOI
18 L. Wu, J. Wang, K.-K. R. Choo, and D. He, "Secure key agreement and key protection for mobile device user authentication," IEEE Transactions on Information Forensics and Security, vol. 14, no. 2, pp. 319-330, 2018.   DOI
19 M. Waqas, M. Ahmed, Y. Li, D. Jin, and S. Chen, "Social-aware secret key generation for secure device-to-device communication via trusted and non-trusted relays," IEEE Transactions on Wireless Communications, vol. 17, no. 6, pp. 3918-3930, 2018.   DOI
20 M. Wang, Z. Yan, and V. Niemi, "Uaka-d2d: Universal authentication and key agreement protocol in d2d communications," Mobile Networks and Applications, vol. 22, no. 3, pp. 510-525, 2017.   DOI
21 Y. Zhang, K. Cheng, F. Khan, R. Alturki, R. Khan, and A. U. Rehman, "A mutual authentication scheme for establishing secure device-to-device communication sessions in the edge-enabled smart cities," Journal of Information Security and Applications, vol. 58, p. 102683, 2021.   DOI