A lightweight D2D security protocol with request-forecasting for next-generation mobile networks
5G-assisted device-to-device (D2D) communication plays an instrumental role in minimizing latency, maximizing resource utilization, improving speed, and boosting system capacity. However, the technology confronts several challenges to realize its enormous potential fully. Security and privacy concer...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Taylor & Francis Group
2022-12-01
|
Series: | Connection Science |
Subjects: | |
Online Access: | http://dx.doi.org/10.1080/09540091.2021.2002812 |
_version_ | 1797684013439123456 |
---|---|
author | Daniel Gerbi Duguma Jiyoon Kim Sangmin Lee Nam-Su Jho Vishal Sharma Ilsun You |
author_facet | Daniel Gerbi Duguma Jiyoon Kim Sangmin Lee Nam-Su Jho Vishal Sharma Ilsun You |
author_sort | Daniel Gerbi Duguma |
collection | DOAJ |
description | 5G-assisted device-to-device (D2D) communication plays an instrumental role in minimizing latency, maximizing resource utilization, improving speed, and boosting system capacity. However, the technology confronts several challenges to realize its enormous potential fully. Security and privacy concerns are at the top of the list that can jeopardize the regular operation of D2D communication by executing various assaults such as free-riding and impersonation. Although several researchers suggested different solutions to these concerns, most are too heavy for resource-constrained devices or are vulnerable to security risks. Consequently, we proposed a lightweight and provably secure D2D communication protocol comprising initialization, device discovery, and link setup phases. The protocol is light in terms of computational overhead and communication latency while verifiably secure through formal security analysis. The protocol relies on a new network function, called D2D Security Management Function (DSMF), located near the devices to facilitate secure communication and improve performance. Moreover, we used deep learning-based UE trust score forecasting to better handle and prioritize communication requests when the network is overloaded. The comparative analysis against state-of-the-art security schemes concerning computational and communication overheads shows that our protocol is a superior alternative for resource-constrained IoT devices wishing to perform D2D communication in a 5G network. |
first_indexed | 2024-03-12T00:24:26Z |
format | Article |
id | doaj.art-90751ad824e84032a410727f87bc615c |
institution | Directory Open Access Journal |
issn | 0954-0091 1360-0494 |
language | English |
last_indexed | 2024-03-12T00:24:26Z |
publishDate | 2022-12-01 |
publisher | Taylor & Francis Group |
record_format | Article |
series | Connection Science |
spelling | doaj.art-90751ad824e84032a410727f87bc615c2023-09-15T10:48:00ZengTaylor & Francis GroupConnection Science0954-00911360-04942022-12-0134136238610.1080/09540091.2021.20028122002812A lightweight D2D security protocol with request-forecasting for next-generation mobile networksDaniel Gerbi Duguma0Jiyoon Kim1Sangmin Lee2Nam-Su Jho3Vishal Sharma4Ilsun You5Soonchunhyang UniversitySoonchunhyang UniversitySoonchunhyang UniversityElectronics and Telecommunications Research Institute (ETRI)Queen's University Belfast (QUB)Soonchunhyang University5G-assisted device-to-device (D2D) communication plays an instrumental role in minimizing latency, maximizing resource utilization, improving speed, and boosting system capacity. However, the technology confronts several challenges to realize its enormous potential fully. Security and privacy concerns are at the top of the list that can jeopardize the regular operation of D2D communication by executing various assaults such as free-riding and impersonation. Although several researchers suggested different solutions to these concerns, most are too heavy for resource-constrained devices or are vulnerable to security risks. Consequently, we proposed a lightweight and provably secure D2D communication protocol comprising initialization, device discovery, and link setup phases. The protocol is light in terms of computational overhead and communication latency while verifiably secure through formal security analysis. The protocol relies on a new network function, called D2D Security Management Function (DSMF), located near the devices to facilitate secure communication and improve performance. Moreover, we used deep learning-based UE trust score forecasting to better handle and prioritize communication requests when the network is overloaded. The comparative analysis against state-of-the-art security schemes concerning computational and communication overheads shows that our protocol is a superior alternative for resource-constrained IoT devices wishing to perform D2D communication in a 5G network.http://dx.doi.org/10.1080/09540091.2021.2002812device-to-device communicationinternet of things5gsecurityformal verification |
spellingShingle | Daniel Gerbi Duguma Jiyoon Kim Sangmin Lee Nam-Su Jho Vishal Sharma Ilsun You A lightweight D2D security protocol with request-forecasting for next-generation mobile networks Connection Science device-to-device communication internet of things 5g security formal verification |
title | A lightweight D2D security protocol with request-forecasting for next-generation mobile networks |
title_full | A lightweight D2D security protocol with request-forecasting for next-generation mobile networks |
title_fullStr | A lightweight D2D security protocol with request-forecasting for next-generation mobile networks |
title_full_unstemmed | A lightweight D2D security protocol with request-forecasting for next-generation mobile networks |
title_short | A lightweight D2D security protocol with request-forecasting for next-generation mobile networks |
title_sort | lightweight d2d security protocol with request forecasting for next generation mobile networks |
topic | device-to-device communication internet of things 5g security formal verification |
url | http://dx.doi.org/10.1080/09540091.2021.2002812 |
work_keys_str_mv | AT danielgerbiduguma alightweightd2dsecurityprotocolwithrequestforecastingfornextgenerationmobilenetworks AT jiyoonkim alightweightd2dsecurityprotocolwithrequestforecastingfornextgenerationmobilenetworks AT sangminlee alightweightd2dsecurityprotocolwithrequestforecastingfornextgenerationmobilenetworks AT namsujho alightweightd2dsecurityprotocolwithrequestforecastingfornextgenerationmobilenetworks AT vishalsharma alightweightd2dsecurityprotocolwithrequestforecastingfornextgenerationmobilenetworks AT ilsunyou alightweightd2dsecurityprotocolwithrequestforecastingfornextgenerationmobilenetworks AT danielgerbiduguma lightweightd2dsecurityprotocolwithrequestforecastingfornextgenerationmobilenetworks AT jiyoonkim lightweightd2dsecurityprotocolwithrequestforecastingfornextgenerationmobilenetworks AT sangminlee lightweightd2dsecurityprotocolwithrequestforecastingfornextgenerationmobilenetworks AT namsujho lightweightd2dsecurityprotocolwithrequestforecastingfornextgenerationmobilenetworks AT vishalsharma lightweightd2dsecurityprotocolwithrequestforecastingfornextgenerationmobilenetworks AT ilsunyou lightweightd2dsecurityprotocolwithrequestforecastingfornextgenerationmobilenetworks |