EEoP: A Lightweight Security Scheme over PKI in D2D Cellular Networks
Keywords:
Elliptic Curve Cryptography, Elgamal Cryptography, Public Key Infrastructure, Security Threats,Abstract
Device-to-Device (D2D) communication is a promising technology that facilitates the deployment of devices to provide extended coverage where devices can act as user or relays. However, introducing such technology where the user can act as semi-intelligent relays, open a wide range of security threats, specifically, in terms of confidentiality and integrity. Another key issue of these devices is the limited computational and storage capabilities. Thus, to address the above challenges, this paper proposed a computationally lightweight crypto system based on Elliptic curve and ElGamal over public-key infrastructure (EEoP). It uses ECC for creation of keys while uses ElGamal for encryption and decryption over public-key infrastructure. Mathematical analysis shows that EEoP ensures the confidentiality and integrity of the communication. Performance analysis shows that proposed scheme outperformed the baseline protocols. The proposed crypto system can be used in relay-based communication.References
A. Kalka, M. Teicher, and B. Tsaban, “Short expressions of permutations as products and cryptanalysis of the Algebraic Eraser,” Advances in Applied Mathematics, vol. 49, no. 1, pp. 57-76, 2012.
J. Hoffstein, J. Pipher, and J. H. Silverman, “NTRU: A ring-based public key cryptosystem,” In International Algorithmic Number Theory Symposium, Springer, Berlin, Heidelberg, pp. 267-288, Jun. 1998.
W. Shen, W. Hong, X. Cao, B. Yin, D. M. Shila, and Y. Cheng, “Secure key establishment for device-to-device communications,” In Global Communications Conference (GLOBECOM), 2014 IEEE, pp. 336-340, Dec. 2014. IEEE.
A. G. Reddy, E. J. Yoon, A. K. Das, and K. Y. Yoo, ”Lightweight authentication with key-agreement protocol for mobile network environment using smart cards,” IET Information Security, vol. 10, no. 5, pp. 272-282, 2016.
A. G. Reddy, E. J. Yoon, A. K. Das, V. Odelu, and K. Y. Yoo, “Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment,” IEEE Access, vol. 5, pp. 3622-3639, 2017.
C. Cheng, R. Lu, A. Petzoldt, and T. Takagi, “Securing the Internet of Things in a Quantum World,” IEEE Communications Magazine, vol. 55, no. 2, pp. 116-120, 2017.
K. Lauter, “The advantages of elliptic curve cryptography for wireless security,” IEEE Wireless communications, vol. 11, no. 1, pp. 62-67, 2004.
N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of computation, vol. 48, no. 177, pp. 203-209, 1987.
U.S. Department of Commerce/National Institute of Standards and Technology. Digital Signature Standard (DSS). FIPS-186-4, 2013. http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf.
Z. Liu, X. Huang, Z. Hu, M. K. Khan, H. Seo, and L. Zhou, “On emerging family of elliptic curves to secure internet of things: Ecc comes of age,” IEEE Transactions on Dependable and Secure Computing, vol. 14, no. 3, pp. 237-248, 2017.
J. Y. Kim, W. Hu, H. Shafagh, and S. Jha, “SEDA: Secure Over-TheAir Code Dissemination Protocol for the Internet of Things,” IEEE Transactions on Dependable and Secure Computing, 2016.
D. S. Laiphrakpam and M. S. Khumanthem, “A robust image encryption scheme based on chaotic system and elliptic curve over finite field,” Multimedia Tools and Applications, pp. 1-24, 2017.
R. Sedidi and A. Kumar, “Key exchange protocols for secure Deviceto-Device (D2D) communication in 5G,” In 2016 Wireless Days (WD), pp. 1-6, Mar. 2016. IEEE.
W. Xi, X. Y. Li, C. Qian, J. Han, S. Tang, J. Zhao, and K. Zhao, “Keep: Fast secret key extraction protocol for d2d communication,” In Quality of Service (IWQoS), 2014 IEEE 22nd International Symposium of, pp. 350-359, May 2014. IEEE.
M. J. Raju, P. Subbaiah, and V Ramesh, “A novel elliptic curve cryptography based aodv for mobile ad-hoc networks for enhanced security,” Journal of theoretical & applied information technology, vol. 58, no. 3, 2013.
S. S. Dake and R. U. Ighare, “A proposed ECC algorithm for smart cards cell phones and wireless networks,” In Nascent Technologies in Engineering (ICNTE), 2017 International Conference on, pp. 1-4, Jan. 2017. IEEE.
Y. Jung, E. Festijo, and M. Peradilla, “Joint operation of routing control and group key management for 5G ad hoc D2D networks,” In Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on, pp. 1-8, May 2014. IEEE.
S. A. Chaudhry, H. Naqvi, M. Sher, M. S. Farash, and M. U. Hassan, “An improved and provably secure privacy preserving authentication protocol for SIP,” Peer-to-Peer Networking and Applications, vol. 10, no. 1, pp. 1-15, 2017.
P. Mohit, R. Amin, and G. P. Biswas, “Design of authentication protocol for wireless sensor network-based smart vehicular system,” Vehicular Communications, vol. 9, pp. 64-71, 2017.
K. Fan, P. Song, and Y. Yang, “ULMAP: Ultralightweight NFC Mutual Authentication Protocol with Pseudonyms in the Tag for IoT in 5G,” Mobile Information Systems, 2017.
Y. Wang, B. Ramamurthy, and X. Zou, “The performance of elliptic curve based group diffie-hellman protocols for secure group communication over ad hoc networks,” In Communications, 2006. ICC'06. IEEE International Conference on, vol. 5, pp. 2243-2248, Jun 2006. IEEE.
V. Gupta, S. Gupta, S. Chang, and D. Stebila, “Performance analysis of elliptic curve cryptography for SSL,” In Proceedings of the 1st ACM workshop on Wireless security, pp. 87-94, Sep. 2002. ACM.
S. A. Vanstone, “Next generation security for wireless: elliptic curve cryptography,” Computers & Security, vol. 22, no. 5, pp. 412-415, 2003.
D. Hankerson, A. J. Menezes, and S. Vanstone, Guide to elliptic curve cryptography, Springer Science & Business Media, 2006.
N. P. Smart, “The discrete logarithm problem on elliptic curves of trace one,” Journal of cryptology, vol. 12, no. 3, pp. 193-196, 1999.
C. A. Meadows, “Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches,” In European Symposium on Research in Computer Security, pp. 351-364. Springer, Berlin, Heidelberg, Sep. 1996.
K. Matsuo, J. Chao, and S. Tsujii, “An improved baby step giant step algorithm for point counting of hyperelliptic curves over finite fields,” In ANTS, pp. 461-474, Jul. 2002.
A. J. Menezes, T. Okamoto, and S. A. Vanstone, “Reducing elliptic curve logarithms to logarithms in a finite field,” iEEE Transactions on information Theory, vol. 39, no. 5, pp. 1639-1646, 1993.
M. Wang and Z. Yan, “A Survey on Security in D2D Communications,” Mobile Networks and Applications, pp. 1-14, 2016.
A. S. Khan, Y. Javed, J. Abdullah, J. M. Nazim, and N. Khan, “Security issues in 5G device to device communication,” IJCSNS, vol. 17, no. 5, p. 366, 2017.
M. Wang and Z. Yan, (2017) “A survey on security in D2D communications,” Mobile Networks and Applications, vol. 22, no. 2, pp. 195-208, 2017.
M. N. Tehrani, M. Uysal, and H. Yanikomeroglu, “Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions,” IEEE Communications Magazine, vol. 52, no. 5, pp. 86-92, 2014.
M. Wang and Z. Yan, “Security in D2D communications: a review,” In Trustcom/BigDataSE/ISPA, 2015 IEEE, vol. 1, pp. 1199-1204, Aug. 2015. IEEE.
A. Osseiran, F. Boccardi, V. Braun, K. Kusume, P. Marsch, M. Maternia, and H. Tullberg, “Scenarios for 5G mobile and wireless communications: the vision of the METIS project,” IEEE Communication Magazine, vol. 52, no. 5, pp. 26-35, 2014.
A. S. Khan, H. Lenando, J. Abdullah, and M. N. B. Jambli,, “Lightweight message authentication protocol for mobile multihop relay networks,” International Review on Computers and Software (IRECOS), vol. 9, no. 10, pp. 1720-1730, 2014.
A. S. Khan, “Secure and efficient distributed relay-based rekeying algorithm for group communication in mobile multihop relay network,” International Journal of Communication Networks and Information Security, vol. 6, no. 3, p. 189, 2014.
Downloads
Published
How to Cite
Issue
Section
License
TRANSFER OF COPYRIGHT AGREEMENT
The manuscript is herewith submitted for publication in the Journal of Telecommunication, Electronic and Computer Engineering (JTEC). It has not been published before, and it is not under consideration for publication in any other journals. It contains no material that is scandalous, obscene, libelous or otherwise contrary to law. When the manuscript is accepted for publication, I, as the author, hereby agree to transfer to JTEC, all rights including those pertaining to electronic forms and transmissions, under existing copyright laws, except for the following, which the author(s) specifically retain(s):
- All proprietary right other than copyright, such as patent rights
- The right to make further copies of all or part of the published article for my use in classroom teaching
- The right to reuse all or part of this manuscript in a compilation of my own works or in a textbook of which I am the author; and
- The right to make copies of the published work for internal distribution within the institution that employs me
I agree that copies made under these circumstances will continue to carry the copyright notice that appears in the original published work. I agree to inform my co-authors, if any, of the above terms. I certify that I have obtained written permission for the use of text, tables, and/or illustrations from any copyrighted source(s), and I agree to supply such written permission(s) to JTEC upon request.