ABSTRACT
The next-generation mobile communication, which is 5G wireless mobile networks, has become the paradigm to bring not only solutions for the rising demand for huge data traffic, and massively connected devices such as IoT but also new services. One of the promising solutions is that device-to-device communications are expected to play a key role to improve efficiency and have low latency. Most importantly, D2D communications will be the key enabler for group-based services. However, the new case scenarios and new system architecture of 5G Heterogeneous Networks are vulnerable against various attacks since the 5G is still in the early stage. It is utmost important to have a secure and privacy-preserving scheme for D2D communications in 5G HetNets. Even though various research studies have been done by the researchers for D2D communications but many of them fail to address the heterogenous access scenarios, identity protection, and group authentication. In this paper, we propose a certificateless privacy-preserving authentication and key agreement scheme for D2D communications in 5G HetNets using identity-based encryption and elliptic curve digital signature algorithm (ECDSA) to achieve secure and robust communication. The proposed scheme has been analyzed in terms of security and performance. The result of the formal verification using AVISPA and performance analysis shows that the scheme is secure, lightweight and efficient.
- P. Zhang, X. Yang, J. Chen, and Y. Huang, "A survey of testing for 5G: Solutions, opportunities, and challenges," China Communications, vol. 16, no. 1, pp. 69--85, 2019.Google Scholar
- I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila, and A. Gurtov, "Overview of 5G security challenges and solutions," IEEE Communications Standards Magazine, vol. 2, no. 1, pp. 36--43, 2018.Google ScholarCross Ref
- S. Sarraf, "5G Emerging Technology and Affected Industries: Quick Survey," American Scientific Research Journal for Engineering, Technology, and Sciences (ASRJETS), vol. 55, no. 1, pp. 75--82, 2019.Google Scholar
- M. Wang, Z. Yan, and V. Niemi, "UAKA-D2D: Universal authentication and key agreement protocol in D2D communications," Mobile Networks and Applications, vol. 22, no. 3, pp. 510--525, 2017.Google ScholarCross Ref
- Y. Sun, J. Cao, M. Ma, H. Li, B. Niu, and F. Li, "Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet," in 2019 International Conference on Computing, Networking and Communications (ICNC), 2019, pp. 425--431: IEEE.Google Scholar
- D. Wu, L. Zhou, and Y. Cai, "Social-aware rate based content sharing mode selection for D2D content sharing scenarios," IEEE Transactions on Multimedia, vol. 19, no. 11, pp. 2571--2582, 2017.Google ScholarCross Ref
- "Technical specification group services and system aspects; feasibility study for proximity services (prose); (release 12)," 3GPP TR22.803, 2013.Google Scholar
- "Technical specification group services and system aspects; proximitybased services (prose); (release 15)," 3GPP TS23.303, 2018.Google Scholar
- R.-H. Hsu, J. Lee, T. Q. Quek, and J.-C. Chen, "GRAAD: Group anonymous and accountable D2D communication in mobile networks," IEEE Transactions on Information Forensics and Security, vol. 13, no. 2, pp. 449--464, 2017.Google ScholarDigital Library
- M. Wang and Z. Yan, "Privacy-preserving authentication and key agreement protocols for D2D group communications," IEEE Transactions on Industrial Informatics, vol. 14, no. 8, pp. 3637--3647, 2017.Google ScholarCross Ref
- "Technical specification group services and system aspects; system architecture for the 5g system; (release 16)," 3GPP TR23.501, 2019.Google Scholar
- D. von Oheimb, "The high-level protocol specification language HLPSL developed in the EU project AVISPA," in Proceedings of APPSEM 2005 workshop, 2005, pp. 1--17.Google Scholar
- "Ieee standard for identity-based cryptographic techniques using pairings," IEEE P1363.3/D9, pp. 1--136, 2013.Google Scholar
- "Technical specification group services and system aspects; service requirements for the 5g system; (release 16)," 3GPP TS22.261, 20Google Scholar
Index Terms
- A Group Authentication Scheme with Privacy-preserving for D2D Communications in 5G HetNets
Recommendations
Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme
As it does not require a central authority or the cooperation among multiple authorities, decentralized attribute-based encryption is an efficient and flexible multi-authority attribute-based encryption system. In most existing multi-authority attribute-...
Certificateless public verification scheme with privacy-preserving and message recovery for dynamic group
ACSW '17: Proceedings of the Australasian Computer Science Week MulticonferencePublic auditing is a topic issue as it makes a third party auditor replace user to verify the data integrity. Hence, it handles users' problems such as cannot be on-line all times and with constrained computing resources. However, this technology may ...
A Convertible Multi-Authenticated Encryption scheme for group communications
Recently, Wu et al. proposed a Convertible Multi-Authenticated Encryption (CMAE) scheme, which allows a signing group with multiple signers to generate a multi-authenticated ciphertext signature on the chosen message so that only a designated verifier ...
Comments