EEoP: A Lightweight Security Scheme over PKI in D2D Cellular Networks

Authors

  • Yasir Javed Network Security Research Group, Faculty of Computer Science and Information Technology, Universiti Malaysia, Sarawak. RIOTU, CCIS, Prince Sultan University, Riyadh, KSA.
  • Adnan Shahid Khan Network Security Research Group, Faculty of Computer Science and Information Technology, Universiti Malaysia, Sarawak.
  • Abdul Qahar Network Security Research Group, Faculty of Computer Science and Information Technology, Universiti Malaysia, Sarawak. The University of Punjab, Lahore, Pakistan.
  • Johari Abdullah Network Security Research Group, Faculty of Computer Science and Information Technology, Universiti Malaysia, Sarawak.

Keywords:

Elliptic Curve Cryptography, Elgamal Cryptography, Public Key Infrastructure, Security Threats,

Abstract

Device-to-Device (D2D) communication is a promising technology that facilitates the deployment of devices to provide extended coverage where devices can act as user or relays. However, introducing such technology where the user can act as semi-intelligent relays, open a wide range of security threats, specifically, in terms of confidentiality and integrity. Another key issue of these devices is the limited computational and storage capabilities. Thus, to address the above challenges, this paper proposed a computationally lightweight crypto system based on Elliptic curve and ElGamal over public-key infrastructure (EEoP). It uses ECC for creation of keys while uses ElGamal for encryption and decryption over public-key infrastructure. Mathematical analysis shows that EEoP ensures the confidentiality and integrity of the communication. Performance analysis shows that proposed scheme outperformed the baseline protocols. The proposed crypto system can be used in relay-based communication.

Downloads

Published

2017-12-07

How to Cite

Javed, Y., Khan, A. S., Qahar, A., & Abdullah, J. (2017). EEoP: A Lightweight Security Scheme over PKI in D2D Cellular Networks. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(3-11), 99–105. Retrieved from https://jtec.utem.edu.my/jtec/article/view/3191

Most read articles by the same author(s)