A Proxy Signature-Based Drone Authentication in 5G D2D Networks

被引:7
|
作者
Abdel-Malek, Mai A. [1 ]
Akkaya, Kemal [1 ]
Bhuyan, Arupjyoti [2 ]
Ibrahim, Ahmed S. [1 ]
机构
[1] Florida Int Univ, Dept Elect & Comp Engn, Miami, FL 33174 USA
[2] Idaho Natl Lab, INL Wireless Secur Inst, Idaho Falls, ID 83401 USA
关键词
5G security; authentication; D2D; drones; delegation; proxy signature; COMMUNICATION; INTERNET; SCHEME;
D O I
10.1109/VTC2021-Spring51267.2021.9448962
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
5G is the beginning of a new era in cellular communication, bringing up a highly connected network with the incorporation of the Internet of Things (IoT). To flexibly operate all the IoT devices over a cellular network, Device-to-Device (D2D) communication standard was developed. However, IoT devices such as drones utilizing 5G D2D services could be a perfect target for malicious attacks as they pose several safety threats if they are compromised. Furthermore, there will be heavy traffic with an increased number of IoT devices connected to the 5G core. Therefore, we propose a lightweight, fast, and reliable authentication mechanism compatible with the 5G D2D ProSe standard mechanisms. Specifically, we propose a distributed authentication with a delegation-based scheme instead of the repeated access to the 5G core network key management functions. Hence, a legitimate drone is authorized by the core network via offering a proxy signature to authenticate itself to other drones. We implemented the proposed protocol in ns-3 that supports 5G D2D-based communication. We also conducted computational calculations on the RaspberryPi3 IoT device to mimic the drone calculation process and delays. The results demonstrate that the proposed protocol is lightweight and reliable.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] A Proxy Signature-Based Swarm Drone Authentication With Leader Selection in 5G Networks
    Abdel-Malek, Mai A.
    Akkaya, Kemal
    Bhuyan, Arupjyoti
    Ibrahim, Ahmed S.
    [J]. IEEE ACCESS, 2022, 10 : 57485 - 57498
  • [2] A Certificateless Authentication Protocol for D2D Group Communications in 5G Cellular Networks
    Shang, Zhengyi
    Ma, Maode
    Li, Xiaohong
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [3] Evaluation of D2D Communications in 5G Networks
    Bulashenko, A., V
    [J]. VISNYK NTUU KPI SERIIA-RADIOTEKHNIKA RADIOAPARATOBUDUVANNIA, 2020, (81): : 21 - 29
  • [4] A lightweight traceable D2D authentication and key agreement scheme in 5G cellular networks*
    Chow, Man Chun
    Ma, Maode
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2021, 95
  • [5] Handover Management for D2D Communication in 5G Networks
    Lai, Wei Kuang
    Shieh, Chin-Shiuh
    Chou, Fu-Sheng
    Hsu, Chia-Yu
    Shen, Meng-Han
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (12):
  • [6] D2D NOMA Groupcast in 5G Heterogeneous Networks
    Kaliski R.
    [J]. SN Computer Science, 2021, 2 (5)
  • [7] On One D2D Usage Model for 5G Networks
    Namiot, Dmitry
    Sneps-Sneppe, Manfred
    [J]. PROCEEDINGS OF THE 28TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION FRUCT, 2021, : 322 - 327
  • [8] Dynamic group authentication and key agreement protocol for D2D secure communication in 5G networks
    Cheng, Xianbing
    Jiang, Rui
    Pei, Bei
    Wu, Songyang
    [J]. Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2020, 50 (05): : 918 - 928
  • [9] Enhanced Resource Blocks Management in D2D based Communication for 5G Networks
    Reddy, Mannur Kishor Kumar
    Kanishka, R.
    Nandakumar, S.
    Velmurugan, T.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (01) : 367 - 383
  • [10] Energy Borrowing Transmission Scheme Based on D2D Communication for 5G Networks
    Saito, Megumi
    Koshimizu, Takashi
    Pan, Zhenni
    Liu, Jiang
    Nakazawa, Hayato
    Shimamoto, Shigeru
    [J]. IEEE ACCESS, 2021, 9 : 165841 - 165853