Secure D2D Communication for 5G IoT Network Based on Lightweight Cryptography
Open Access
- 27 December 2019
- journal article
- research article
- Published by MDPI AG in Applied Sciences
- Vol. 10 (1), 217
- https://doi.org/10.3390/app10010217
Abstract
Device-to-device (D2D) communication is a direct means of communication between devices without an intermediate node, and it helps to expand cell coverage and to increase radio frequency reuse in a 5G network. Moreover, D2D communication is a core technology of 5G vehicle-to-everything (V2X) communication, which is an essential technology for autonomous driving. However, typical D2D communication in an 4G network which is typical telecommunication network has various security challenges including impersonation, eavesdropping, privacy sniffing, free-riding attack, etc. Moreover, when IoT technology emerges with 5G networks in massive machine type communication (mMTC) and ultra-reliable low latency communication (URLLC) application scenarios, these security challenges are more crucial and harder to mitigate because of the resource-constrained nature of IoT devices. To solve the security challenges in a 5G IoT environment, we need a lightweight and secure D2D communication system that can provide secure authentication, data confidentiality/integrity and anonymity. In this paper, we survey and analyze existing results about secure D2D communication systems in terms of their security considerations and limitations. Then, we lastly propose a secure D2D communication system to address the aforementioned security challenges and the limitations of the existing results. The proposed secure D2D communication was designed based on elliptic curve cryptography (ECC) and lightweight authenticated encryption with associated data (AEAD) ciphers to cover resource-constrained IoT devices.Funding Information
- Seoul National University of Science and Technology (This study was supported by the Advanced Research Project funded by the SeoulTech (Seoul 317 National University of Science and Technology))
This publication has 9 references indexed in Scilit:
- Towards secure 5G networks: A SurveyComputer Networks, 2019
- Secure D2D Group Authentication Employing Smartphone Sensor Behavior AnalysisSymmetry, 2019
- TACRM: trust access control and resource management mechanism in fog computingHuman-centric Computing and Information Sciences, 2019
- A Lightweight Elliptic-Elgamal-Based Authentication Scheme for Secure Device-to-Device CommunicationFuture Internet, 2019
- Sec-D2D: A Secure and Lightweight D2D Communication System With Multiple SensorsIEEE Access, 2019
- 5G Internet of Things: A surveyJournal of Industrial Information Integration, 2018
- Vehicle-to-Everything (v2x) Services Supported by LTE-Based Systems and 5GIEEE Communications Standards Magazine, 2017
- Efficient device-to-device discovery and access procedure for 5G cellular networkWireless Communications and Mobile Computing, 2015
- Device-to-device communication in 5G cellular networks: challenges, solutions, and future directionsIEEE Communications Magazine, 2014