EEoP: A Lightweight Security Scheme over PKI in D2D Cellular Networks

Authors

  • Yasir Javed Network Security Research Group, Faculty of Computer Science and Information Technology, Universiti Malaysia, Sarawak. RIOTU, CCIS, Prince Sultan University, Riyadh, KSA.
  • Adnan Shahid Khan Network Security Research Group, Faculty of Computer Science and Information Technology, Universiti Malaysia, Sarawak.
  • Abdul Qahar Network Security Research Group, Faculty of Computer Science and Information Technology, Universiti Malaysia, Sarawak. The University of Punjab, Lahore, Pakistan.
  • Johari Abdullah Network Security Research Group, Faculty of Computer Science and Information Technology, Universiti Malaysia, Sarawak.

Keywords:

Elliptic Curve Cryptography, Elgamal Cryptography, Public Key Infrastructure, Security Threats,

Abstract

Device-to-Device (D2D) communication is a promising technology that facilitates the deployment of devices to provide extended coverage where devices can act as user or relays. However, introducing such technology where the user can act as semi-intelligent relays, open a wide range of security threats, specifically, in terms of confidentiality and integrity. Another key issue of these devices is the limited computational and storage capabilities. Thus, to address the above challenges, this paper proposed a computationally lightweight crypto system based on Elliptic curve and ElGamal over public-key infrastructure (EEoP). It uses ECC for creation of keys while uses ElGamal for encryption and decryption over public-key infrastructure. Mathematical analysis shows that EEoP ensures the confidentiality and integrity of the communication. Performance analysis shows that proposed scheme outperformed the baseline protocols. The proposed crypto system can be used in relay-based communication.

References

A. Kalka, M. Teicher, and B. Tsaban, “Short expressions of permutations as products and cryptanalysis of the Algebraic Eraser,” Advances in Applied Mathematics, vol. 49, no. 1, pp. 57-76, 2012.

J. Hoffstein, J. Pipher, and J. H. Silverman, “NTRU: A ring-based public key cryptosystem,” In International Algorithmic Number Theory Symposium, Springer, Berlin, Heidelberg, pp. 267-288, Jun. 1998.

W. Shen, W. Hong, X. Cao, B. Yin, D. M. Shila, and Y. Cheng, “Secure key establishment for device-to-device communications,” In Global Communications Conference (GLOBECOM), 2014 IEEE, pp. 336-340, Dec. 2014. IEEE.

A. G. Reddy, E. J. Yoon, A. K. Das, and K. Y. Yoo, ”Lightweight authentication with key-agreement protocol for mobile network environment using smart cards,” IET Information Security, vol. 10, no. 5, pp. 272-282, 2016.

A. G. Reddy, E. J. Yoon, A. K. Das, V. Odelu, and K. Y. Yoo, “Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment,” IEEE Access, vol. 5, pp. 3622-3639, 2017.

C. Cheng, R. Lu, A. Petzoldt, and T. Takagi, “Securing the Internet of Things in a Quantum World,” IEEE Communications Magazine, vol. 55, no. 2, pp. 116-120, 2017.

K. Lauter, “The advantages of elliptic curve cryptography for wireless security,” IEEE Wireless communications, vol. 11, no. 1, pp. 62-67, 2004.

N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of computation, vol. 48, no. 177, pp. 203-209, 1987.

U.S. Department of Commerce/National Institute of Standards and Technology. Digital Signature Standard (DSS). FIPS-186-4, 2013. http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf.

Z. Liu, X. Huang, Z. Hu, M. K. Khan, H. Seo, and L. Zhou, “On emerging family of elliptic curves to secure internet of things: Ecc comes of age,” IEEE Transactions on Dependable and Secure Computing, vol. 14, no. 3, pp. 237-248, 2017.

J. Y. Kim, W. Hu, H. Shafagh, and S. Jha, “SEDA: Secure Over-TheAir Code Dissemination Protocol for the Internet of Things,” IEEE Transactions on Dependable and Secure Computing, 2016.

D. S. Laiphrakpam and M. S. Khumanthem, “A robust image encryption scheme based on chaotic system and elliptic curve over finite field,” Multimedia Tools and Applications, pp. 1-24, 2017.

R. Sedidi and A. Kumar, “Key exchange protocols for secure Deviceto-Device (D2D) communication in 5G,” In 2016 Wireless Days (WD), pp. 1-6, Mar. 2016. IEEE.

W. Xi, X. Y. Li, C. Qian, J. Han, S. Tang, J. Zhao, and K. Zhao, “Keep: Fast secret key extraction protocol for d2d communication,” In Quality of Service (IWQoS), 2014 IEEE 22nd International Symposium of, pp. 350-359, May 2014. IEEE.

M. J. Raju, P. Subbaiah, and V Ramesh, “A novel elliptic curve cryptography based aodv for mobile ad-hoc networks for enhanced security,” Journal of theoretical & applied information technology, vol. 58, no. 3, 2013.

S. S. Dake and R. U. Ighare, “A proposed ECC algorithm for smart cards cell phones and wireless networks,” In Nascent Technologies in Engineering (ICNTE), 2017 International Conference on, pp. 1-4, Jan. 2017. IEEE.

Y. Jung, E. Festijo, and M. Peradilla, “Joint operation of routing control and group key management for 5G ad hoc D2D networks,” In Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on, pp. 1-8, May 2014. IEEE.

S. A. Chaudhry, H. Naqvi, M. Sher, M. S. Farash, and M. U. Hassan, “An improved and provably secure privacy preserving authentication protocol for SIP,” Peer-to-Peer Networking and Applications, vol. 10, no. 1, pp. 1-15, 2017.

P. Mohit, R. Amin, and G. P. Biswas, “Design of authentication protocol for wireless sensor network-based smart vehicular system,” Vehicular Communications, vol. 9, pp. 64-71, 2017.

K. Fan, P. Song, and Y. Yang, “ULMAP: Ultralightweight NFC Mutual Authentication Protocol with Pseudonyms in the Tag for IoT in 5G,” Mobile Information Systems, 2017.

Y. Wang, B. Ramamurthy, and X. Zou, “The performance of elliptic curve based group diffie-hellman protocols for secure group communication over ad hoc networks,” In Communications, 2006. ICC'06. IEEE International Conference on, vol. 5, pp. 2243-2248, Jun 2006. IEEE.

V. Gupta, S. Gupta, S. Chang, and D. Stebila, “Performance analysis of elliptic curve cryptography for SSL,” In Proceedings of the 1st ACM workshop on Wireless security, pp. 87-94, Sep. 2002. ACM.

S. A. Vanstone, “Next generation security for wireless: elliptic curve cryptography,” Computers & Security, vol. 22, no. 5, pp. 412-415, 2003.

D. Hankerson, A. J. Menezes, and S. Vanstone, Guide to elliptic curve cryptography, Springer Science & Business Media, 2006.

N. P. Smart, “The discrete logarithm problem on elliptic curves of trace one,” Journal of cryptology, vol. 12, no. 3, pp. 193-196, 1999.

C. A. Meadows, “Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches,” In European Symposium on Research in Computer Security, pp. 351-364. Springer, Berlin, Heidelberg, Sep. 1996.

K. Matsuo, J. Chao, and S. Tsujii, “An improved baby step giant step algorithm for point counting of hyperelliptic curves over finite fields,” In ANTS, pp. 461-474, Jul. 2002.

A. J. Menezes, T. Okamoto, and S. A. Vanstone, “Reducing elliptic curve logarithms to logarithms in a finite field,” iEEE Transactions on information Theory, vol. 39, no. 5, pp. 1639-1646, 1993.

M. Wang and Z. Yan, “A Survey on Security in D2D Communications,” Mobile Networks and Applications, pp. 1-14, 2016.

A. S. Khan, Y. Javed, J. Abdullah, J. M. Nazim, and N. Khan, “Security issues in 5G device to device communication,” IJCSNS, vol. 17, no. 5, p. 366, 2017.

M. Wang and Z. Yan, (2017) “A survey on security in D2D communications,” Mobile Networks and Applications, vol. 22, no. 2, pp. 195-208, 2017.

M. N. Tehrani, M. Uysal, and H. Yanikomeroglu, “Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions,” IEEE Communications Magazine, vol. 52, no. 5, pp. 86-92, 2014.

M. Wang and Z. Yan, “Security in D2D communications: a review,” In Trustcom/BigDataSE/ISPA, 2015 IEEE, vol. 1, pp. 1199-1204, Aug. 2015. IEEE.

A. Osseiran, F. Boccardi, V. Braun, K. Kusume, P. Marsch, M. Maternia, and H. Tullberg, “Scenarios for 5G mobile and wireless communications: the vision of the METIS project,” IEEE Communication Magazine, vol. 52, no. 5, pp. 26-35, 2014.

A. S. Khan, H. Lenando, J. Abdullah, and M. N. B. Jambli,, “Lightweight message authentication protocol for mobile multihop relay networks,” International Review on Computers and Software (IRECOS), vol. 9, no. 10, pp. 1720-1730, 2014.

A. S. Khan, “Secure and efficient distributed relay-based rekeying algorithm for group communication in mobile multihop relay network,” International Journal of Communication Networks and Information Security, vol. 6, no. 3, p. 189, 2014.

Downloads

Published

2017-12-07

How to Cite

Javed, Y., Khan, A. S., Qahar, A., & Abdullah, J. (2017). EEoP: A Lightweight Security Scheme over PKI in D2D Cellular Networks. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(3-11), 99–105. Retrieved from https://jtec.utem.edu.my/jtec/article/view/3191

Most read articles by the same author(s)