A Comprehensive Secure Protocol for All D2D Scenarios

نویسندگان

چکیده

To fulfill two integral aims of abating cellular traffic and enhancing efficiency network, D2D is considered as a novel channel communication. This form communication has introduced for 4th enacts significant role in the 5th generation. Four scenarios defined references, includes direct relaying both with without infrastructure. One major challenges addressing protocols contributes to fact that they have one single secure protocol can adapt four scenarios. In current study, we propose based on ARIADNE. authenticate key agreement between Source Destination, employ LTE-A AKA protocol, further broadcast authentication nodes TESLA was applied. Contrary recent protocols, our proposed inconsiderable computation overhead trivial than SODE preserve many security properties such Authentication, Authorization, Confidentiality, Integrity, Secure Key Agreement, Routing Transmission. We check Reachability, Agreement ProVerif verification tools.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Multi-hop Secure LTE-D2D Communication Protocol for IoT Scenarios

The Internet-of-Things (IoT) is promising to inter-connect physical objects and machines in an intelligent network. In this context, scalable and resilient Machine-to-Machine (M2M) communication protocols are required, and the new Device-to-Device (D2D) feature of the 4G system constitutes an appealing solution. Standardization activities are still in progress, but the rapid diffusion of both L...

متن کامل

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

LTE-A Access, Core, and Protocol Architecture for D2D Communication

The term device-to-device (D2D) communications refers to direct short-range communications between terminals of a mobile network, without the intermediate transmission to a base station (BS). Differing from conventional approaches, such as Bluetooth and WiFi-Direct, D2D communications utilize licensed spectrum with quality of service (QoS) guarantees, while no manual network detection-selection...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of wireless and mobile networks

سال: 2021

ISSN: ['0975-3834', '0975-4679']

DOI: https://doi.org/10.5121/ijwmn.2021.13401