{"title":"覆盖范围外场景中的 5G 辅助 D2D 通信 AKA 协议","authors":"Ponjit Borgohain, Hiten Choudhury","doi":"10.1016/j.jnca.2024.104025","DOIUrl":null,"url":null,"abstract":"<div><p>5G-assisted Device to Device (D2D) communication can be broadly categorized into three use case scenarios: In Coverage, Relay Coverage, and Out-of Coverage. The main challenge lies in ensuring secure communication in Out-of Coverage scenarios, as in this situation, neither of the two devices is within the 5G network’s coverage area. Although several researchers have developed authentication mechanisms for securing D2D communication, most are unsuitable for Out-of Coverage scenarios. Additionally, many of these mechanisms cannot withstand free-riding attacks due to the absence of a trusted entity. In a 5G cellular network, a trust relationship can be established between a registered device and the home network through mutual authentication whenever the former is within the latter’s coverage area. Leveraging this trust, this paper proposes a lightweight 5G-assisted authentication protocol for mutual authentication between two communicating devices in Out-of Coverage scenarios. The proposed protocol meets the necessary security goals and mitigates various security attacks, including free-riding attacks. The correctness of the proposed protocol is formally established using the Scyther tool and Random Oracle Model. Furthermore, performance analysis shows that the protocol is efficient in terms of computation overhead, communication overhead and energy consumption compared to similar works in the literature. The computation overhead is found to be 596.12 ms for the Requestor device and 587.26 ms for the Requestee device. The communication overhead is 2720 bits and the total energy consumption for both devices combined is found to be 3016.93 millijoules.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"232 ","pages":"Article 104025"},"PeriodicalIF":7.7000,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An AKA protocol for 5G-assisted D2D communication in Out-of-Coverage scenario\",\"authors\":\"Ponjit Borgohain, Hiten Choudhury\",\"doi\":\"10.1016/j.jnca.2024.104025\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>5G-assisted Device to Device (D2D) communication can be broadly categorized into three use case scenarios: In Coverage, Relay Coverage, and Out-of Coverage. The main challenge lies in ensuring secure communication in Out-of Coverage scenarios, as in this situation, neither of the two devices is within the 5G network’s coverage area. Although several researchers have developed authentication mechanisms for securing D2D communication, most are unsuitable for Out-of Coverage scenarios. Additionally, many of these mechanisms cannot withstand free-riding attacks due to the absence of a trusted entity. In a 5G cellular network, a trust relationship can be established between a registered device and the home network through mutual authentication whenever the former is within the latter’s coverage area. Leveraging this trust, this paper proposes a lightweight 5G-assisted authentication protocol for mutual authentication between two communicating devices in Out-of Coverage scenarios. The proposed protocol meets the necessary security goals and mitigates various security attacks, including free-riding attacks. The correctness of the proposed protocol is formally established using the Scyther tool and Random Oracle Model. Furthermore, performance analysis shows that the protocol is efficient in terms of computation overhead, communication overhead and energy consumption compared to similar works in the literature. The computation overhead is found to be 596.12 ms for the Requestor device and 587.26 ms for the Requestee device. The communication overhead is 2720 bits and the total energy consumption for both devices combined is found to be 3016.93 millijoules.</p></div>\",\"PeriodicalId\":54784,\"journal\":{\"name\":\"Journal of Network and Computer Applications\",\"volume\":\"232 \",\"pages\":\"Article 104025\"},\"PeriodicalIF\":7.7000,\"publicationDate\":\"2024-09-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Network and Computer Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1084804524002029\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Network and Computer Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1084804524002029","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
An AKA protocol for 5G-assisted D2D communication in Out-of-Coverage scenario
5G-assisted Device to Device (D2D) communication can be broadly categorized into three use case scenarios: In Coverage, Relay Coverage, and Out-of Coverage. The main challenge lies in ensuring secure communication in Out-of Coverage scenarios, as in this situation, neither of the two devices is within the 5G network’s coverage area. Although several researchers have developed authentication mechanisms for securing D2D communication, most are unsuitable for Out-of Coverage scenarios. Additionally, many of these mechanisms cannot withstand free-riding attacks due to the absence of a trusted entity. In a 5G cellular network, a trust relationship can be established between a registered device and the home network through mutual authentication whenever the former is within the latter’s coverage area. Leveraging this trust, this paper proposes a lightweight 5G-assisted authentication protocol for mutual authentication between two communicating devices in Out-of Coverage scenarios. The proposed protocol meets the necessary security goals and mitigates various security attacks, including free-riding attacks. The correctness of the proposed protocol is formally established using the Scyther tool and Random Oracle Model. Furthermore, performance analysis shows that the protocol is efficient in terms of computation overhead, communication overhead and energy consumption compared to similar works in the literature. The computation overhead is found to be 596.12 ms for the Requestor device and 587.26 ms for the Requestee device. The communication overhead is 2720 bits and the total energy consumption for both devices combined is found to be 3016.93 millijoules.
期刊介绍:
The Journal of Network and Computer Applications welcomes research contributions, surveys, and notes in all areas relating to computer networks and applications thereof. Sample topics include new design techniques, interesting or novel applications, components or standards; computer networks with tools such as WWW; emerging standards for internet protocols; Wireless networks; Mobile Computing; emerging computing models such as cloud computing, grid computing; applications of networked systems for remote collaboration and telemedicine, etc. The journal is abstracted and indexed in Scopus, Engineering Index, Web of Science, Science Citation Index Expanded and INSPEC.