PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

LEES: a Hybrid Lightweight Elliptic ElGamal-Schnorr-Based Cryptography for Secure D2D Communications

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Device-to-device (D2D) communications in 5G networks will provide greater coverage, as devices will be acting as users or relays without any intermediate nodes. However, this arrangement poses specific security issues, such as rogue relays, and is susceptible to various types of attacks (impersonation, eavesdropping, denial-of-service), due to the fact that communication occurs directly. It is also recommended to send fewer control messages, due to authenticity- and secrecy related prevailing requirements in such scenarios. Issues related to IoT applications need to be taken into consideration as well, as IoT networks are inherently resource-constrained and susceptible to various attacks. Therefore, novel signcryption algorithms which combine encryption with digital signatures are required to provide secure 5G IoT D2D communication scenarios in order to protect user information and their data against attacks, without simultaneously increasing communication costs. In this paper, we propose LEES, a secure authentication scheme using public key encryption for secure D2D communications in 5G IoT networks. This lightweight solution is a hybrid of elliptic curve ElGamal-Schnorr algorithms. The proposed scheme is characterized by low requirements concerning computation cost, storage and network bandwidth, and is immune to security threats, thus meeting confidentiality, authenticity, integrity and non-repudiation-related criteria that are so critical for digital signature schemes. It may be used in any 5G IoT architectures requiring enhanced D2D security and performance.
Rocznik
Tom
Strony
24--30
Opis fizyczny
Bibliogr. 8 poz., rys., tab.
Twórcy
  • School of Computing and Information Technology, REVA University, Bangalore, India
autor
  • School of Computing and Information Technology, REVA University, Bangalore, India
autor
  • School of Computing and Information Technology, REVA University, Bangalore, India
Bibliografia
  • [1] G. Wang, R. H. Deng, D. Kwak, and SangJae Moon, „Security analysis of two signcryption schemes", in Information Security 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings, K. Zhang and Y. Zheng, Eds. LNCS, vol. 3225, pp. 123-133. Berlin: Springer, 2004 (DOI: 10.1007/978-3-540-30144-8 11).
  • [2] J. Liu, N. Kato, J. Ma, and N. Kadowaki, „Device-to-device communication in LTE-advanced networks: A survey", IEEE Commun. Surv. and Tutor., vol. 17, no. 4, pp. 1923-1940 2015 (DOI: 10.1109/COMST.2014.2375934).
  • [3] L. M. Theobald et al., „Device-to-device discovery for proximity-based service in LTE-advanced system", IEEE J. on Selected Areas in Communication, vol. 33, no. 1, pp. 55-66, 2015 (DOI: 10.1109/JSAC.2014.2369591).
  • [4] Y.-S. Shiu, S.-Y. Chang, H.-C. Wu, S. C.-H. Huang, H.-H. Chen, „Physical layer security in wireless networks; A tutorial", IEEE Wireless Communication, vol. 18, no. 2, pp. 66-74, 2011 (DOI: 10.1109/MWC.2011.5751298).
  • [5] A. S. Khan, Y. Javed, J. Abdullah, J. M. Nazim, and N. Khan, „Security issues in 5G device to device communication", Int. J. of Comp. Sci. and Netw. Secur. (IJCSNS), vol. 17 no. 5, pp. 366-375 [Online]. Available: http://paper.ijcsns.org/07 book/201705/20170550.pdf
  • [6] W. Stallings, “Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud”. Boston: Addison-Wesley Professional, 2015 (ISBN: 9780367378158).
  • [7] H. Lazrag, H. Chaibi, S. Rachid, and M. D. Rahmani, „An optimal and secure routing protocol for wireless sensor networks", in Proc. of 6th Int. Conf. on Multime. Comput. and Systems ICMCS 2018, Rabat, Morocco, 2018 (DOI: 10.1109/ICMCS.2018.8525911).
  • [8] M. Alenezi, K. Almustafa, and M. Hussein, „On virtualization and security-awareness performance analysis in 5G cellular networks", J. of Engin. Sci. and Technol. Rev., vol. 11, no. 1, pp. 199-207, 2018 (DOI: 10.25103/jestr.111.24).
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2021).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-ca9edab0-31bb-459c-af1e-0c710ac8543b
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.