Abstract

The fifth generation (5G) mobile networks provide intensive and low-latency communications, which are applicable to an emerging data sharing/exchange technology called Device-to-device (D2D) communication. For a safety D2D communication, is essential to ensure the legitimacy of devices and the secrecy of communications before it practiced. However, the basic security specification can only support secure one-to-one or one-to-many D2D communications with the assistance of security-related components,i.e., access and mobility management function (AMF), authentication server function (AuSF), and unified data management (UDM), in the 5G core network. It results that 5G core networks always have to handled the discovery of mobile devices. Since the components related to user authentication are involved, the device discovery procedures result in no privacy for users. To overcome the above issues, this work proposes a secure attribute-based access control mechanism to support secure device discovery with fine-grained access control based on edge computing model for D2D communications in 5G, called SGD <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> . SGD <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> guarantees the privacy of D2D communications against the infrastructures of 5G mobile networks. Additionally, this work provides security analysis and empirical performance evaluation for the security and feasibility. To sum up, the proposed SGD <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> is the practice of D2D communications with the features of fine-grained access control and privacy against mobile network operators in 5G for the applications of IoT.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call