A Secure Scalable Authentication Protocol for Access Network Communications using ECC

被引:2
|
作者
Patel, Suyash [1 ]
Dua, Amit [1 ]
Kumar, Neeraj [2 ]
机构
[1] BITS Pilani, Dept Comp Sci & Informat Syst, Pilani, Rajasthan, India
[2] Thapar Univ, Comp Sci & Engn Dept, Patiala, Punjab, India
关键词
Elliptic curve cryptography; Device-to-device communication; 5G; Network security; KEY AGREEMENT;
D O I
10.1109/ICCWorkshops50388.2021.9473557
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The secure message exchange is instrumental in the success of device-to-device communication. Any malicious activity has the potential to compromise the confidentiality or integrity of the messages exchanged between different user equipment. To address the aforementioned issue, this study proposes a novel elliptic curve cryptography based key-exchange protocol for authentication of two user equipment in network-assisted D2D communication. The proposed protocol is based on standard elliptic curve Diffie-Hellman key exchange and hash-based message authentication code. Subsequently, elaborate threat analysis of the proposed protocol against several adversarial attacks is presented to prove its resilience. The observed low computational time and communication overhead associated with this protocol and its resilience against known attacks advance its strong candidature for implementation of D2D communication in 5G cellular networks.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things
    Naeem, Muhammad
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Karuppiah, Marimuthu
    Kumari, Saru
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (13)
  • [2] A Scalable Robust Authentication Protocol for Secure Vehicular Communications
    Zhang, Lei
    Wu, Qianhong
    Solanas, Agusti
    Domingo-Ferrer, Josep
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2010, 59 (04) : 1606 - 1617
  • [3] A secure authentication protocol for wearable devices environment using ECC
    Kumar, Devender
    Grover, Harmanpreet Singh
    Adarsh
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 (8-15) : 8 - 15
  • [4] Scalable Authentication Protocol for Wireless Mesh Network Access
    Wang Ze
    Wang Qi
    Liu Wenju
    Ke Yongzhen
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3051 - 3054
  • [5] ESAP: Efficient and Scalable Authentication Protocol with Conditional Privacy for Secure Vehicular Communications
    Weerasinghe, Hesiri
    Fu, Huirong
    [J]. 2010 IEEE GLOBECOM WORKSHOPS, 2010, : 1729 - 1734
  • [6] Secure and Scalable RFID Authentication Protocol
    Fernandez-Mir, Albert
    Castella-Roca, Jordi
    Viejo, Alexandre
    [J]. DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, 2011, 6514 : 231 - 243
  • [7] Provably Secure Access Authentication Protocol under Universal Network
    Zheng, Lijuan
    Han, Zhen
    Zhang, Rui
    Fan, Tongrang
    [J]. 2009 SECOND INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING: KAM 2009, VOL 3, 2009, : 371 - +
  • [8] A new provably secure authentication and key agreement protocol for SIP using ECC
    Wu, Liufei
    Zhang, Yuqing
    Wang, Fengjiao
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 286 - 291
  • [9] A provably secure ECC-based access and handover authentication protocol for space information networks
    Guo, Junyan
    Du, Ye
    Zhang, Yahang
    Li, Meihong
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 193
  • [10] Efficient Authentication Protocol for Secure Vehicular Communications
    Ying, Bidi
    Nayak, Amiya
    [J]. 2014 IEEE 79TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-SPRING), 2014,