skip to main content
10.1145/3409934.3409955acmotherconferencesArticle/Chapter ViewAbstractPublication PagesieccConference Proceedingsconference-collections
research-article

A Group Authentication Scheme with Privacy-preserving for D2D Communications in 5G HetNets

Authors Info & Claims
Published:25 August 2020Publication History

ABSTRACT

The next-generation mobile communication, which is 5G wireless mobile networks, has become the paradigm to bring not only solutions for the rising demand for huge data traffic, and massively connected devices such as IoT but also new services. One of the promising solutions is that device-to-device communications are expected to play a key role to improve efficiency and have low latency. Most importantly, D2D communications will be the key enabler for group-based services. However, the new case scenarios and new system architecture of 5G Heterogeneous Networks are vulnerable against various attacks since the 5G is still in the early stage. It is utmost important to have a secure and privacy-preserving scheme for D2D communications in 5G HetNets. Even though various research studies have been done by the researchers for D2D communications but many of them fail to address the heterogenous access scenarios, identity protection, and group authentication. In this paper, we propose a certificateless privacy-preserving authentication and key agreement scheme for D2D communications in 5G HetNets using identity-based encryption and elliptic curve digital signature algorithm (ECDSA) to achieve secure and robust communication. The proposed scheme has been analyzed in terms of security and performance. The result of the formal verification using AVISPA and performance analysis shows that the scheme is secure, lightweight and efficient.

References

  1. P. Zhang, X. Yang, J. Chen, and Y. Huang, "A survey of testing for 5G: Solutions, opportunities, and challenges," China Communications, vol. 16, no. 1, pp. 69--85, 2019.Google ScholarGoogle Scholar
  2. I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila, and A. Gurtov, "Overview of 5G security challenges and solutions," IEEE Communications Standards Magazine, vol. 2, no. 1, pp. 36--43, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  3. S. Sarraf, "5G Emerging Technology and Affected Industries: Quick Survey," American Scientific Research Journal for Engineering, Technology, and Sciences (ASRJETS), vol. 55, no. 1, pp. 75--82, 2019.Google ScholarGoogle Scholar
  4. M. Wang, Z. Yan, and V. Niemi, "UAKA-D2D: Universal authentication and key agreement protocol in D2D communications," Mobile Networks and Applications, vol. 22, no. 3, pp. 510--525, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  5. Y. Sun, J. Cao, M. Ma, H. Li, B. Niu, and F. Li, "Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet," in 2019 International Conference on Computing, Networking and Communications (ICNC), 2019, pp. 425--431: IEEE.Google ScholarGoogle Scholar
  6. D. Wu, L. Zhou, and Y. Cai, "Social-aware rate based content sharing mode selection for D2D content sharing scenarios," IEEE Transactions on Multimedia, vol. 19, no. 11, pp. 2571--2582, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  7. "Technical specification group services and system aspects; feasibility study for proximity services (prose); (release 12)," 3GPP TR22.803, 2013.Google ScholarGoogle Scholar
  8. "Technical specification group services and system aspects; proximitybased services (prose); (release 15)," 3GPP TS23.303, 2018.Google ScholarGoogle Scholar
  9. R.-H. Hsu, J. Lee, T. Q. Quek, and J.-C. Chen, "GRAAD: Group anonymous and accountable D2D communication in mobile networks," IEEE Transactions on Information Forensics and Security, vol. 13, no. 2, pp. 449--464, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Wang and Z. Yan, "Privacy-preserving authentication and key agreement protocols for D2D group communications," IEEE Transactions on Industrial Informatics, vol. 14, no. 8, pp. 3637--3647, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  11. "Technical specification group services and system aspects; system architecture for the 5g system; (release 16)," 3GPP TR23.501, 2019.Google ScholarGoogle Scholar
  12. D. von Oheimb, "The high-level protocol specification language HLPSL developed in the EU project AVISPA," in Proceedings of APPSEM 2005 workshop, 2005, pp. 1--17.Google ScholarGoogle Scholar
  13. "Ieee standard for identity-based cryptographic techniques using pairings," IEEE P1363.3/D9, pp. 1--136, 2013.Google ScholarGoogle Scholar
  14. "Technical specification group services and system aspects; service requirements for the 5g system; (release 16)," 3GPP TS22.261, 20Google ScholarGoogle Scholar

Index Terms

  1. A Group Authentication Scheme with Privacy-preserving for D2D Communications in 5G HetNets

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        IECC '20: Proceedings of the 2nd International Electronics Communication Conference
        July 2020
        184 pages
        ISBN:9781450377706
        DOI:10.1145/3409934

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 25 August 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited
      • Article Metrics

        • Downloads (Last 12 months)6
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader