Abstract

Device to device (D2D) communication offers numerous benefits such as low latencies, high throughputs, spectral efficiency boosting, and base station energy reduction. However, lack of encryption and authentication during device discovery, link setup, and data transmission exposes the transmitted data to numerous security and privacy threats. To counter these security threats, a number of schemes have been developed based on public key infrastructure, bilinear pairing operations, batch verification, pre-computed lookup tables, symmetric cryptography, and elliptic curve cryptography (ECC) among others. However, these techniques experience very high communication and computation overheads or fail to address privacy and security challenges effectively. In this paper, a session key agreement protocol is proposed to address some of these issues. Simulation results showed that the proposed protocol exhibits the lowest communication costs and average computation costs. In addition, security analysis showed that our protocol is resilient against message replays, masquerade, identity theft, message forgery, and cloning attacks.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.