1,729
Views
1
CrossRef citations to date
0
Altmetric
Articles

A lightweight D2D security protocol with request-forecasting for next-generation mobile networks

, , , , &
Pages 362-386 | Received 27 Sep 2021, Accepted 28 Oct 2021, Published online: 30 Nov 2021

Reference

  • Adnan, M. H., & Ahmad Zukarnain, Z. (2020). Device-to-device communication In 5G environment: Issues, solutions, and challenges. Symmetry, 12(11), 1762. https://doi.org/10.3390/sym12111762
  • Ahamad, S. S., & Khan Pathan, A.-S. (2021). A formally verified authentication protocol In secure framework for mobile healthcare during COVID-19-like pandemic. Connection Science, 33(3), 532–554. https://doi.org/10.1080/09540091.2020.1854180
  • Baskaran, S. B. M., & Raja, G. (2017, December 14–16). A lightweight incognito key exchange mechanism for LTE-A assisted D2D communication. 9th International Conference on Advanced Computing (ICoAC) (pp. 301–307).
  • Boyd, C., & Mao, W. (1993, May 23–27). On a limitation of BAN logic. Workshop on the Theory and Application of Cryptographic Techniques (pp. 240–247).
  • Brown, G. (2018). New Transport Network Architectures for 5G RAN. White Paper. Retrieved June 29, 2021, from https://www.fujitsu.com/us/images/New-Transport-Network-Architectures-for-5G-RAN.pdf
  • Burrows, M., Abadi, M., & Needham, R. M. (1989). A logic of authentication. Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences, 426(1871), 233–271. https://doi.org/10.1098/rspa.1989.0125
  • Caputo, D., Verderame, L., Ranieri, A., Merlo, A., & Caviglione, L. (2020). Fine-hearing google home: Why silence will not protect your privacy. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 11(1), 35–53. http://doi.org/10.22667/JOWUA.2020.03.31.035
  • Chow, M. C., & Ma, M. (2020, July 8–10). A lightweight D2D authentication scheme against free-riding attacks in 5G cellular network. Proceedings of the 2nd International Electronics Communication Conference (pp. 143–149).
  • Cremers, C., & Mauw, S. (2012). Operational semantics. In B. David & P.  Kenny (Eds.), Operational semantics and verification of security protocols (pp. 13–35). Springer.
  • Cremers, C. J. F. (2008, July 7–14). The Scyther tool: Verification, falsification, and analysis of security protocols. International Conference on Computer Aided Verification (pp. 414–418).
  • Dolev, D., & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198–208. https://doi.org/10.1109/TIT.1983.1056650
  • Gandotra, P., Jha, R. K., & Jain, S. (2017). A survey on device-to-device (D2D) communication: Architecture and security issues. Journal of Network and Computer Applications, 78, 9–29. https://doi.org/10.1016/j.jnca.2016.11.002
  • Haus, M., Waqas, M., Ding, A. Y., Li, Y., Tarkoma, S., & Ott, J. (2017). Security and privacy In device-to-device (D2D) communication: A review. IEEE Communications Surveys & Tutorials, 19(2), 1054–1079. https://doi.org/10.1109/COMST.2017.2649687
  • He, D., Zhang, D., Li, Y., Liang, W., & Hsieh, M.-Y. (2021). An efficient and DoS-resilient name lookup for NDN interest forwarding. Connection Science, 33(3), 735–752. https://doi.org/10.1080/09540091.2021.1875988
  • Kar, U. N., & Sanyal, D. K. (2018). An overview of device-to-device communication In cellular networks. ICT Express, 4(4), 203–208. https://doi.org/10.1016/j.icte.2017.08.002
  • Kim, H. (2020). 5G core network security issues and attack classification from network protocol perspective. Journal of Internet Services and Information Security, 10(2), 1–15. http://doi.org/10.22667/JISIS.2020.05.31.001
  • Liang, W., Huang, W., Long, J., Zhang, K., Li, K.-C., & Zhang, D. (2020a). Deep reinforcement learning for resource protection and real-time detection In IoT environment. IEEE Internet of Things Journal, 7(7), 6392–6401. https://doi.org/10.1109/JIOT.2020.2974281
  • Liang, W., Xiao, L., Zhang, K., Tang, M., He, D., & Li, K.-C. (2021). Data fusion approach for collaborative anomaly intrusion detection in blockchain-based systems. IEEE Internet of Things Journal. http://doi.org/10.1109/JIOT.2021.3053842
  • Liang, W., Zhang, D., Lei, X., Tang, M., Li, K.-C., & Zomaya, A. (2020b). Circuit copyright blockchain: Blockchain-based homomorphic encryption for IP circuit protection. IEEE Transactions on Emerging Topics in Computing, 9(3). http://doi.org/10.1109/TETC.2020.2993032
  • Liu, J., Zhang, S., Kato, N., Ujikawa, H., & Suzuki, K. (2015). Device-to-device communications for enhancing quality of experience In software defined multi-tier LTE-A networks. IEEE Network, 29(4), 46–52. https://doi.org/10.1109/MNET.2015.7166190
  • Liu, N., Yu, M., Zang, W., & Sandhu, R. S. (2020). Cost and effectiveness of TrustZone defense and side-channel attack on ARM platform. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 11(4), 1–15. http://doi.org/10.22667/JOWUA.2020.12.31.001
  • Pełka, P., & Dudek, G. (2020, July 19–24). Pattern-based long short-term memory for mid-term electrical load forecasting. International Joint Conference on Neural Networks (IJCNN) (pp. 1–8).
  • Schafer, B., & Edwards, L. (2017). “I spy, with my little sensor”: fair data handling practices for robots between privacy, copyright and security. Connection Science, 29(3), 200–209. https://doi.org/10.1080/09540091.2017.1318356
  • Seok, B., Sicato, J. C. S., Erzhena, T., Xuan, C., Pan, Y., & Park, J. H. (2020). Secure D2D communication for 5G IoT network based on lightweight cryptography. Applied Sciences, 10(1), 217. https://doi.org/10.3390/app10010217
  • Shang, Z., Ma, M., & Li, X. (2019, December 9–13). A certificateless authentication protocol for D2D group communications in 5G cellular networks. IEEE Global Communications Conference (GLOBECOM) (pp. 1–7).
  • Shang, Z., Ma, M., & Li, X. (2020). A secure group-oriented device-to-device authentication protocol for 5G wireless networks. IEEE Transactions on Wireless Communications, 19(11), 7021–7032. https://doi.org/10.1109/TWC.2020.3007702
  • TS23.501, 3GPP. (2021). Technical specification group services and system aspects; system architecture for the 5G system; (Release 16). In 3rd Generation Partnership Project (3GPP): Vol. 16.9.0 (pp. 1–454). 3GPP TS.
  • TS33.501, 3GPP. (2021). 5G; Security architecture and procedures for 5G System; (Release 16). In 3rd Generation Partnership Project (3GPP): Vol. 16.7.1 (pp. 1–259). 3GPP TS.
  • Uchida, N., Sato, G., & Shibata, Y. (2019). Device-to-device communication based DTN for disaster information system by using emergent user policy and locational information. Journal of Internet Services and Information Security, 9(3), 41–51. http://doi.org/10.22667/JISIS.2019.08.31.041
  • Wang, L., Liu, J., Chen, M., Gui, G., & Sari, H. (2018). Optimization-based access assignment scheme for physical-layer security In D2D communications underlaying a cellular network. IEEE Transactions on Vehicular Technology, 67(7), 5766–5777. https://doi.org/10.1109/TVT.2017.2789022
  • Wong, S. K., & Yiu, S.-M. (2020). Location spoofing attack detection with pre-installed sensors In mobile devices. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 11(4), 16–30. http://doi.org/10.22667/JOWUA.2020.12.31.016
  • Xiao, L., Xie, S., Han, D., Liang, W., Guo, J., & Chou, W.-K. (2021). A lightweight authentication scheme for telecare medical information system. Connection Science, 33(3), 1–17. https://doi.org/10.1080/09540091.2021.1889976
  • Zhang, A., & Lin, X. (2017). Security-aware and privacy-preserving D2D communications In 5G. IEEE Network, 31(4), 70–77. https://doi.org/10.1109/MNET.2017.1600290
  • Zhang, J., Cheng, Z., Cheng, X., & Chen, B. (2021). OAC-HAS: Outsourced access control with hidden access structures In fog-enhanced IoT systems. Connection Science, 33(4), 1060–1076. https://doi.org/10.1080/09540091.2020.1841096
  • Zhang, S., Wang, Y., & Zhou, W. (2019). Towards secure 5G networks: A survey. Computer Networks, 162, 106871. https://doi.org/10.1016/j.comnet.2019.106871
  • Zheng, Z., Zhou, Y., Sun, Y., Wang, Z., Liu, B., & Li, K. (2021). Applications of federated learning in smart cities: Recent advances, taxonomy, and open challenges. Connection Science. https://doi.org/10.1080/09540091.2021.1936455
  • Zhou, J., Xu, Y., & Li, X. (2011). A security mechanism for RFID with dependable proxy. Intelligent Automation & Soft Computing, 17(6), 815–825. https://doi.org/10.1080/10798587.2011.10643190