A Lightweight D2D Authentication Scheme against Free-riding Attacks in 5G Cellular Network

M. Chow, M. Ma
{"title":"A Lightweight D2D Authentication Scheme against Free-riding Attacks in 5G Cellular Network","authors":"M. Chow, M. Ma","doi":"10.1145/3409934.3409952","DOIUrl":null,"url":null,"abstract":"As a promising feature in 5G, device-to-device (D2D) communication is the technology allowing adjacent mobile devices to communicate directly without relaying the data over base stations. D2D technology can potentially increase the network capacity by offloading network traffic in a distributed manner. However, there are also new security challenges such as free-riding attack prevention, device anonymity protection and end-to-end data secrecy. Also, since there are many mobile devices which have limited computational resources in 5G cellular network, there is a need to develop a lightweight authentication protocol which addresses all these security requirements with low computational overhead. In this paper, we propose a lightweight D2D authentication and key agreement protocol based on elliptic curve cryptography (ECC). Specifically, our proposed scheme makes use of the elliptic curve digital signature algorithm (ECDSA), elliptic curve Diffie-Hellman (ECDH) and authenticated encryption with associate data (AEAD) to provide secure device discovery, mutual authentication, key agreement and data transmission for all 5G D2D devices. Our scheme is computationally lightweight to be supported in any resource-constrained 5G devices, and it can resist several active and passive protocol attacks including eavesdropping, replay attack, man-in-the-middle attack and free-riding attack. We analyze the security of our protocol with Scyther to show our scheme is resistant to these attacks. Finally, performance evaluation shows our scheme is efficient for both UEs and CN with rationally low computational costs.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"110 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2nd International Electronics Communication Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3409934.3409952","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

As a promising feature in 5G, device-to-device (D2D) communication is the technology allowing adjacent mobile devices to communicate directly without relaying the data over base stations. D2D technology can potentially increase the network capacity by offloading network traffic in a distributed manner. However, there are also new security challenges such as free-riding attack prevention, device anonymity protection and end-to-end data secrecy. Also, since there are many mobile devices which have limited computational resources in 5G cellular network, there is a need to develop a lightweight authentication protocol which addresses all these security requirements with low computational overhead. In this paper, we propose a lightweight D2D authentication and key agreement protocol based on elliptic curve cryptography (ECC). Specifically, our proposed scheme makes use of the elliptic curve digital signature algorithm (ECDSA), elliptic curve Diffie-Hellman (ECDH) and authenticated encryption with associate data (AEAD) to provide secure device discovery, mutual authentication, key agreement and data transmission for all 5G D2D devices. Our scheme is computationally lightweight to be supported in any resource-constrained 5G devices, and it can resist several active and passive protocol attacks including eavesdropping, replay attack, man-in-the-middle attack and free-riding attack. We analyze the security of our protocol with Scyther to show our scheme is resistant to these attacks. Finally, performance evaluation shows our scheme is efficient for both UEs and CN with rationally low computational costs.
5G蜂窝网络中抗搭便车攻击的轻量级D2D认证方案
设备到设备(D2D)通信是5G的一个有前途的功能,它允许相邻的移动设备直接通信,而无需通过基站中继数据。D2D技术可以通过以分布式方式卸载网络流量来潜在地增加网络容量。然而,也有新的安全挑战,如搭便车攻击防御、设备匿名保护和端到端数据保密。此外,由于5G蜂窝网络中有许多计算资源有限的移动设备,因此需要开发一种轻量级身份验证协议,以低计算开销解决所有这些安全需求。本文提出了一种基于椭圆曲线密码学(ECC)的轻量级D2D认证和密钥协商协议。具体而言,我们提出的方案利用椭圆曲线数字签名算法(ECDSA)、椭圆曲线Diffie-Hellman算法(ECDH)和关联数据认证加密(AEAD),为所有5G D2D设备提供安全的设备发现、相互认证、密钥协议和数据传输。我们的方案是计算轻量级的,可以在任何资源受限的5G设备上支持,并且可以抵抗多种主动和被动协议攻击,包括窃听、重放攻击、中间人攻击和搭便车攻击。我们用Scyther分析了协议的安全性,证明了我们的方案能够抵抗这些攻击。最后,性能评估表明我们的方案对ue和CN都是有效的,并且计算成本很低。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信