An AKA protocol for 5G-assisted D2D communication in Out-of-Coverage scenario

IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Journal of Network and Computer Applications Pub Date : 2024-09-13 DOI:10.1016/j.jnca.2024.104025
Ponjit Borgohain, Hiten Choudhury
{"title":"An AKA protocol for 5G-assisted D2D communication in Out-of-Coverage scenario","authors":"Ponjit Borgohain,&nbsp;Hiten Choudhury","doi":"10.1016/j.jnca.2024.104025","DOIUrl":null,"url":null,"abstract":"<div><p>5G-assisted Device to Device (D2D) communication can be broadly categorized into three use case scenarios: In Coverage, Relay Coverage, and Out-of Coverage. The main challenge lies in ensuring secure communication in Out-of Coverage scenarios, as in this situation, neither of the two devices is within the 5G network’s coverage area. Although several researchers have developed authentication mechanisms for securing D2D communication, most are unsuitable for Out-of Coverage scenarios. Additionally, many of these mechanisms cannot withstand free-riding attacks due to the absence of a trusted entity. In a 5G cellular network, a trust relationship can be established between a registered device and the home network through mutual authentication whenever the former is within the latter’s coverage area. Leveraging this trust, this paper proposes a lightweight 5G-assisted authentication protocol for mutual authentication between two communicating devices in Out-of Coverage scenarios. The proposed protocol meets the necessary security goals and mitigates various security attacks, including free-riding attacks. The correctness of the proposed protocol is formally established using the Scyther tool and Random Oracle Model. Furthermore, performance analysis shows that the protocol is efficient in terms of computation overhead, communication overhead and energy consumption compared to similar works in the literature. The computation overhead is found to be 596.12 ms for the Requestor device and 587.26 ms for the Requestee device. The communication overhead is 2720 bits and the total energy consumption for both devices combined is found to be 3016.93 millijoules.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"232 ","pages":"Article 104025"},"PeriodicalIF":7.7000,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Network and Computer Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1084804524002029","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

Abstract

5G-assisted Device to Device (D2D) communication can be broadly categorized into three use case scenarios: In Coverage, Relay Coverage, and Out-of Coverage. The main challenge lies in ensuring secure communication in Out-of Coverage scenarios, as in this situation, neither of the two devices is within the 5G network’s coverage area. Although several researchers have developed authentication mechanisms for securing D2D communication, most are unsuitable for Out-of Coverage scenarios. Additionally, many of these mechanisms cannot withstand free-riding attacks due to the absence of a trusted entity. In a 5G cellular network, a trust relationship can be established between a registered device and the home network through mutual authentication whenever the former is within the latter’s coverage area. Leveraging this trust, this paper proposes a lightweight 5G-assisted authentication protocol for mutual authentication between two communicating devices in Out-of Coverage scenarios. The proposed protocol meets the necessary security goals and mitigates various security attacks, including free-riding attacks. The correctness of the proposed protocol is formally established using the Scyther tool and Random Oracle Model. Furthermore, performance analysis shows that the protocol is efficient in terms of computation overhead, communication overhead and energy consumption compared to similar works in the literature. The computation overhead is found to be 596.12 ms for the Requestor device and 587.26 ms for the Requestee device. The communication overhead is 2720 bits and the total energy consumption for both devices combined is found to be 3016.93 millijoules.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
覆盖范围外场景中的 5G 辅助 D2D 通信 AKA 协议
5G 辅助设备对设备(D2D)通信可大致分为三种用例场景:覆盖范围内、中继覆盖和覆盖范围外。主要挑战在于如何确保覆盖范围外场景下的安全通信,因为在这种情况下,两个设备都不在 5G 网络的覆盖范围内。虽然一些研究人员已经开发出确保 D2D 通信安全的认证机制,但大多数都不适合覆盖范围外场景。此外,由于缺乏可信实体,许多此类机制无法抵御搭便车攻击。在 5G 蜂窝网络中,只要注册设备在家庭网络的覆盖范围内,就可以通过相互认证在注册设备和家庭网络之间建立信任关系。利用这种信任关系,本文提出了一种轻量级 5G 辅助认证协议,用于在覆盖范围外场景中两个通信设备之间的相互认证。所提出的协议符合必要的安全目标,并能减少各种安全攻击,包括搭便车攻击。利用 Scyther 工具和随机 Oracle 模型正式确定了所提协议的正确性。此外,性能分析表明,与文献中的类似作品相比,该协议在计算开销、通信开销和能耗方面都很高效。请求者设备的计算开销为 596.12 毫秒,被请求者设备的计算开销为 587.26 毫秒。通信开销为 2720 比特,两个设备的总能耗为 3016.93 毫焦。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Journal of Network and Computer Applications
Journal of Network and Computer Applications 工程技术-计算机:跨学科应用
CiteScore
21.50
自引率
3.40%
发文量
142
审稿时长
37 days
期刊介绍: The Journal of Network and Computer Applications welcomes research contributions, surveys, and notes in all areas relating to computer networks and applications thereof. Sample topics include new design techniques, interesting or novel applications, components or standards; computer networks with tools such as WWW; emerging standards for internet protocols; Wireless networks; Mobile Computing; emerging computing models such as cloud computing, grid computing; applications of networked systems for remote collaboration and telemedicine, etc. The journal is abstracted and indexed in Scopus, Engineering Index, Web of Science, Science Citation Index Expanded and INSPEC.
期刊最新文献
On and off the manifold: Generation and Detection of adversarial attacks in IIoT networks Light up that Droid! On the effectiveness of static analysis features against app obfuscation for Android malware detection Clusters in chaos: A deep unsupervised learning paradigm for network anomaly detection Consensus hybrid ensemble machine learning for intrusion detection with explainable AI Adaptive differential privacy in asynchronous federated learning for aerial-aided edge computing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1