Secure Key Establishment for Device-to-Device Communications

被引:0
|
作者
Shen, Wenlong [1 ]
Hong, Weisheng [1 ]
Cao, Xianghui [1 ]
Yin, Bo [1 ]
Shila, Devu Manikantan [2 ]
Cheng, Yu [1 ]
机构
[1] IIT, Dept Elect & Comp Engn, Chicago, IL 60616 USA
[2] United Technol Res Ctr, E Hartford, CT 06108 USA
关键词
D2D communications; Diffie-Hellman; Wi-Fi Direct; key agreement protocol; the man-in-the-middle attack;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the rapid growth of smartphone and tablet users, Device-to-Device (D2D) communications have become an attractive solution for enhancing the performance of traditional cellular networks. However, relevant security issues involved in D2D communications have not been addressed yet. In this paper, we investigate the security requirements and challenges for D2D communications, and present a secure and efficient key agreement protocol, which enables two mobile devices to establish a shared secret key for D2D communications without prior knowledge. Our approach is based on the Diffie-Hellman key agreement protocol and commitment schemes. Compared to previous work, our proposed protocol introduces less communication and computation overhead. We present the design details and security analysis of the proposed protocol. We also integrate our proposed protocol into the existing Wi-Fi Direct protocol, and implement it using Android smartphones.
引用
收藏
页码:336 / 340
页数:5
相关论文
共 50 条
  • [1] A Secure Device-to-Device Link Establishment Scheme for LoRaWAN
    Kim, Jaehyu
    Song, JooSeok
    [J]. IEEE SENSORS JOURNAL, 2018, 18 (05) : 2153 - 2160
  • [2] Secure Message Delivery Games for Device-to-Device Communications
    Panaousis, Emmanouil
    Alpcan, Tansu
    Fereidooni, Hossein
    Conti, Mauro
    [J]. DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2014, 2014, 8840 : 195 - 215
  • [3] Secure Device-to-Device Communications over WiFi Direct
    Shen, Wenlong
    Yin, Bo
    Cao, Xianghui
    Cai, Lin X.
    Cheng, Yu
    [J]. IEEE NETWORK, 2016, 30 (05): : 4 - 9
  • [4] SAFE: Secure and Fast Key Establishment for Resource Constrained Devices in Device to Device Communications
    Kochhar, Mahanya
    Chaudhari, Narendra S.
    Gupta, Shubham
    [J]. MACHINE LEARNING, IMAGE PROCESSING, NETWORK SECURITY AND DATA SCIENCES, MIND 2022, PT II, 2022, 1763 : 293 - 307
  • [5] A New Certificateless System Construction for Multiple Key Generator Centers to Secure Device-to-Device Communications
    Hamoud, Othmane Nait
    Kenaza, Tayeb
    Challal, Yacine
    [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 84 - 95
  • [6] Anonymous Communications for Secure Device-to-Device Aided Fog Computing
    Gope, Prosanta
    Lee, Jemin
    Hsu, Ruei-Hau
    Quek, Tony Q. S.
    [J]. IEEE CONSUMER ELECTRONICS MAGAZINE, 2019, 8 (03) : 10 - 16
  • [7] Secure WiFi-Direct Using Key Exchange for IoT Device-to-Device Communications in a Smart Environment
    Belghazi, Zakariae
    Benamar, Nabil
    Addaim, Adnane
    Kerrache, Chaker Abdelaziz
    [J]. FUTURE INTERNET, 2019, 11 (12):
  • [8] Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
    Sun, Jingchao
    Zhang, Rui
    Zhang, Yanchao
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (06): : 1048 - 1060
  • [9] Audio-Based Security Techniques for Secure Device-to-Device Communications
    Chen, Dajiang
    Zhang, Ning
    Wu, Huici
    Zhang, Kuan
    Lu, Rongxing
    Guizani, Mohsen
    [J]. IEEE NETWORK, 2022, 36 (06): : 54 - 59
  • [10] Secure Resource Allocation in Device-to-Device Communications Underlaying Cellular Networks
    Hossein Ghavami
    Bahareh Akhbari
    [J]. China Communications, 2022, (08) : 149 - 167