SGD2: Secure Group-based Device-to-Device Communications with Fine-grained Access Control for IoT in 5G

Ruei-Hau Hsu, Hsiang-Shian Fan, Lu-Chin Wang
{"title":"SGD2: Secure Group-based Device-to-Device Communications with Fine-grained Access Control for IoT in 5G","authors":"Ruei-Hau Hsu, Hsiang-Shian Fan, Lu-Chin Wang","doi":"10.1109/DSC49826.2021.9346250","DOIUrl":null,"url":null,"abstract":"The fifth generation (5G) mobile networks provide intensive and low-latency communications, which are applicable to an emerging data sharing/exchange technology called Device-to-device (D2D) communication. For a safety D2D communication, is essential to ensure the legitimacy of devices and the secrecy of communications before it practiced. However, the basic security specification can only support secure one-to-one or one-to-many D2D communications with the assistance of security-related components,i.e., access and mobility management function (AMF), authentication server function (AuSF), and unified data management (UDM), in the 5G core network. It results that 5G core networks always have to handled the discovery of mobile devices. Since the components related to user authentication are involved, the device discovery procedures result in no privacy for users. To overcome the above issues, this work proposes a secure attribute-based access control mechanism to support secure device discovery with fine-grained access control based on edge computing model for D2D communications in 5G, called SGD2. SGD2 guarantees the privacy of D2D communications against the infrastructures of 5G mobile networks. Additionally, this work provides security analysis and empirical performance evaluation for the security and feasibility. To sum up, the proposed SGD2 is the practice of D2D communications with the features of fine-grained access control and privacy against mobile network operators in 5G for the applications of IoT.","PeriodicalId":184504,"journal":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","volume":"57 11","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DSC49826.2021.9346250","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The fifth generation (5G) mobile networks provide intensive and low-latency communications, which are applicable to an emerging data sharing/exchange technology called Device-to-device (D2D) communication. For a safety D2D communication, is essential to ensure the legitimacy of devices and the secrecy of communications before it practiced. However, the basic security specification can only support secure one-to-one or one-to-many D2D communications with the assistance of security-related components,i.e., access and mobility management function (AMF), authentication server function (AuSF), and unified data management (UDM), in the 5G core network. It results that 5G core networks always have to handled the discovery of mobile devices. Since the components related to user authentication are involved, the device discovery procedures result in no privacy for users. To overcome the above issues, this work proposes a secure attribute-based access control mechanism to support secure device discovery with fine-grained access control based on edge computing model for D2D communications in 5G, called SGD2. SGD2 guarantees the privacy of D2D communications against the infrastructures of 5G mobile networks. Additionally, this work provides security analysis and empirical performance evaluation for the security and feasibility. To sum up, the proposed SGD2 is the practice of D2D communications with the features of fine-grained access control and privacy against mobile network operators in 5G for the applications of IoT.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
SGD2:基于安全组的设备对设备通信,支持5G物联网的细粒度访问控制
第五代(5G)移动网络提供密集和低延迟的通信,适用于新兴的数据共享/交换技术,称为设备到设备(Device-to-device, D2D)通信。对于安全的D2D通信,在实施之前确保设备的合法性和通信的保密性至关重要。然而,基本的安全规范只能在与安全相关的组件的帮助下支持安全的一对一或一对多D2D通信。接入和移动管理功能(AMF)、认证服务器功能(AuSF)和统一数据管理(UDM)。这导致5G核心网络必须始终处理移动设备的发现。由于涉及到与用户身份验证相关的组件,因此设备发现过程对用户没有隐私。为了克服上述问题,本工作提出了一种基于安全属性的访问控制机制,以支持基于5G D2D通信边缘计算模型的细粒度访问控制的安全设备发现,称为SGD2。SGD2保证了D2D通信在5G移动网络基础设施下的隐私性。此外,本文还对系统的安全性和可行性进行了安全性分析和实证性能评价。综上所述,所提出的SGD2是对D2D通信的实践,具有细粒度访问控制和针对移动网络运营商的5G物联网应用隐私的特点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Provable Data Possession Protocol in Cloud Storage Systems with Fault Tolerance Arithmetic Coding for Floating-Point Numbers A Novel Dynamic Group Signature with Membership Privacy ExamChain: A Privacy-Preserving Onscreen Marking System based on Consortium Blockchain Designated Verifier Signature Transformation: A New Framework for One-Time Delegating Verifiability
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1