A security protocol for D2D communications in 5G networks using elliptic curve cryptography
نویسندگان
چکیده
Advancements in the field of wireless and mobile communication motivate academia, industry, standardisation organisations to explore new technologies improve overall efficiency, spectrum utilisation, power consumption, security. One most essential proposed for short-range communications, which will play a key role 5G networks, is device-to-device (D2D) communications. D2D enables direct between two devices when they are close proximity without requiring help fixed infrastructure like base stations. Despite significant benefits provided by this networking paradigm introduces unique security threats services that should be solved order limit any malicious attacks. Towards end, paper, we focus on secure communications propose protocol establishing using elliptic curve cryptography. The utilises: (i) specific Mobile Identifiers acquired from hardware phone (i.e. IMEI) SIM card IMSI, MSISDN) operator (ii) storage saving private keys or signature data. verified validated with Scyther tool, performance evaluated terms resiliency analysis.
منابع مشابه
A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography
In this article, the authors shall propose a new method for the implementation of secure Bluetooth piconets. Two requirements for the systems must be considered, i.e., privacy and authentication. Privacy ensures that an eavesdropper cannot intercept conversations between two slaves in piconets. Authentication ensures that service is not obtained fraudulently in order to avoid charge for usage. ...
متن کاملElliptic curve cryptography in cloud computing security
Cloud computing is a technological advancement that has been growing swiftly during the last decade. In simple terms, cloud computing is a technology that enables shared, remote, on-demand and ubiquitous access to services through the Internet. It enables consumers to access applications and services that reside on remote servers, without having to allocate large amounts of storage space on the...
متن کاملA Review on Distributed System Security using Elliptic Curve Cryptography
Most of the security architecture uses public key cryptosystems for authentication and to secure the communication that takes place on distributes sites. Now a day’s identity based cryptography and certificate-less public key cryptography are used for enhancing the security. Certificate-less based cryptography has reduced the certificate necessity for key distribution and reducing the problem o...
متن کاملAn efficient Access Control Protocol for cloud data security using Hyper Elliptic Curve Cryptography
One of the popular area in Information Technology (IT) is Cloud computing. It provides services such as Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) in on-demand basis. Clouds are capable of servicing millions of user requests. Due to huge amount of sensitive information are stored in cloud there is a need to authorize and authenticate users ...
متن کاملFramework for Providing Security and Energy saving Using Elliptic Curve Cryptography in Wireless Sensor Networks
In this recent years wireless sensors attracted the wireless sensor networks due to the significant advances in minimization. Wireless sensor networks consist of autonomous sensor nodes attached to one or more base stations. Wireless networks of low-power sensing devices are poised to become a ubiquitous part of the computing landscape. As Wireless sensor networks continues to grow, they become...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Information Security
سال: 2022
ISSN: ['1615-5262', '1615-5270']
DOI: https://doi.org/10.1007/s10207-022-00620-8