A comprehensive secure protocol for all D2D scenarios

09/14/2021
by   Hoda Nematy, et al.
0

To fulfill two integral aims of abating cellular traffic and enhancing efficiency of cellular network, D2D is considered as a novel channel of communication. This form of communication has introduced for 4th cellular communication and enacts a significant role in the 5th generation. Four D2D communication scenarios defined in the references, includes direct D2D and relaying D2D communication both with and without cellular infrastructure. One of the major challenges addressing D2D protocols contributes to the fact that they have one single secure protocol that can adapt to the four scenarios. In the current study, we propose a secure D2D protocol based on ARIADNE. To authenticate and key agreement between Source and Destination, we employ LTE-A AKA protocol, further for broadcast authentication between relaying nodes TESLA was applied. In Contrary to the recent protocols, our proposed protocol has inconsiderable computation overhead and trivial communication overhead than SODE and preserve many security properties such as Authentication, Authorization, Confidentiality, Integrity, Secure Key Agreement, and Secure Routing Transmission. We check Authentication, Confidentiality, Reachability, and Secure Key Agreement of the proposed protocol with ProVerif verification tools.

READ FULL TEXT

page 7

page 8

research
08/24/2021

Authentication and Access Control in 5G Device-to-Device Communication

Device-to-device (D2D) communication is one of the most recent advanceme...
research
10/11/2020

Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication

Continuous Authentication (CA) has been proposed as a potential solution...
research
10/07/2021

A Sidelink-Aided Approach for Secure Multicast Service Delivery: from Human-Oriented Multimedia Traffic to Machine Type Communications

To date, group-oriented communications have been mainly exploited for de...
research
08/21/2023

SCC5G: A PQC-based Architecture for Highly Secure Critical Communication over Cellular Network in Zero-Trust Environment

5G made a significant jump in cellular network security by offering enha...
research
10/17/2021

Blockchain Enabled Secure Authentication for Unmanned Aircraft Systems

The integration of air and ground smart vehicles is becoming a new parad...
research
11/04/2017

Game theoretic path selection to support security in device-to-device communications

Device-to-Device (D2D) communication is expected to be a key feature sup...
research
06/21/2019

The Saeed-Liu-Tian-Gao-Li authenticated key agreement protocol is insecure

A recently proposed authenticated key agreement protocol is shown to be ...

Please sign up or login with your details

Forgot password? Click here to reset