Journal article 695 views
Secure Device-to-Device communications for 5G enabled Internet of Things applications
Computer Communications, Volume: 169, Pages: 114 - 128
Swansea University Author: Pardeep Kumar
Full text not available from this repository: check for access using links below.
DOI (Published version): 10.1016/j.comcom.2021.01.010
Abstract
Smart cities are developed to optimize operations across the city such as waste and traffic management, water supply management, criminal tracking, and pollution monitoring, etc. Smart cities are formed by the interconnection of various Internet of Things (IoT) devices for collecting the data from o...
Published in: | Computer Communications |
---|---|
ISSN: | 0140-3664 |
Published: |
Elsevier BV
2021
|
Online Access: |
Check full text
|
URI: | https://cronfa.swan.ac.uk/Record/cronfa60540 |
first_indexed |
2022-07-20T08:24:44Z |
---|---|
last_indexed |
2023-01-13T19:20:44Z |
id |
cronfa60540 |
recordtype |
SURis |
fullrecord |
<?xml version="1.0"?><rfc1807><datestamp>2022-10-31T14:52:21.9305389</datestamp><bib-version>v2</bib-version><id>60540</id><entry>2022-07-20</entry><title>Secure Device-to-Device communications for 5G enabled Internet of Things applications</title><swanseaauthors><author><sid>90a5efa66b9ae87756f5b059eb06ef1e</sid><ORCID>0000-0001-8124-5509</ORCID><firstname>Pardeep</firstname><surname>Kumar</surname><name>Pardeep Kumar</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2022-07-20</date><deptcode>MACS</deptcode><abstract>Smart cities are developed to optimize operations across the city such as waste and traffic management, water supply management, criminal tracking, and pollution monitoring, etc. Smart cities are formed by the interconnection of various Internet of Things (IoT) devices for collecting the data from objects and humans to perform necessary actions. But the challenge lies in the exchange of enormous information in real-time to drive smart city applications. Therefore, smart city applications make use of Device-to-Device (D2D) communications which provides higher bandwidth and lower latency in message exchanges. D2D communications do not need any infrastructure for communication and hence are cost and time effective. However, this advantage becomes a threat as no third party is involved to verify the authenticity of the devices before exchange of real information. Consequently, a reliable authentication mechanism is required to address the security issues in WiFi (wireless fidelity) Direct communication. In this paper, we propose a secure and lightweight mutual authentication and key agreement protocol for WiFi Direct. The principle of the protocol is based upon a commit/open pair and Diffie Hellman key exchange algorithm. It is observed from the simulations that the proposed protocol successfully authenticates the D2D devices in the WiFi Direct environment. Investigation through formal security analysis revealed the strong resistivity of the proposed protocol against the prominent attacks in the WiFi Direct environment. The comparative analysis demonstrates the reliability of the suggested protocol over the traditional one. The proposed protocol eliminates the occurrence of the denial of service (DoS) and man-in-the-middle (MITM) attacks in the discovery and key agreement phase, respectively. The proposed protocol can be easily integrated into the devices enabled with WiFi Direct and can offer a wide security package.</abstract><type>Journal Article</type><journal>Computer Communications</journal><volume>169</volume><journalNumber/><paginationStart>114</paginationStart><paginationEnd>128</paginationEnd><publisher>Elsevier BV</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint>0140-3664</issnPrint><issnElectronic/><keywords>Wi-Fi Direct, Device-to-Device communications, 5G, Internet of Things, Smart cities</keywords><publishedDay>1</publishedDay><publishedMonth>3</publishedMonth><publishedYear>2021</publishedYear><publishedDate>2021-03-01</publishedDate><doi>10.1016/j.comcom.2021.01.010</doi><url/><notes/><college>COLLEGE NANME</college><department>Mathematics and Computer Science School</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>MACS</DepartmentCode><institution>Swansea University</institution><apcterm/><funders/><projectreference/><lastEdited>2022-10-31T14:52:21.9305389</lastEdited><Created>2022-07-20T09:19:29.9456011</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>Gurjot Singh</firstname><surname>Gaba</surname><orcid>0000-0002-0732-1478</orcid><order>1</order></author><author><firstname>Gulshan</firstname><surname>Kumar</surname><orcid>0000-0003-0026-149x</orcid><order>2</order></author><author><firstname>Tai-Hoon</firstname><surname>Kim</surname><order>3</order></author><author><firstname>Himanshu</firstname><surname>Monga</surname><order>4</order></author><author><firstname>Pardeep</firstname><surname>Kumar</surname><orcid>0000-0001-8124-5509</orcid><order>5</order></author></authors><documents/><OutputDurs/></rfc1807> |
spelling |
2022-10-31T14:52:21.9305389 v2 60540 2022-07-20 Secure Device-to-Device communications for 5G enabled Internet of Things applications 90a5efa66b9ae87756f5b059eb06ef1e 0000-0001-8124-5509 Pardeep Kumar Pardeep Kumar true false 2022-07-20 MACS Smart cities are developed to optimize operations across the city such as waste and traffic management, water supply management, criminal tracking, and pollution monitoring, etc. Smart cities are formed by the interconnection of various Internet of Things (IoT) devices for collecting the data from objects and humans to perform necessary actions. But the challenge lies in the exchange of enormous information in real-time to drive smart city applications. Therefore, smart city applications make use of Device-to-Device (D2D) communications which provides higher bandwidth and lower latency in message exchanges. D2D communications do not need any infrastructure for communication and hence are cost and time effective. However, this advantage becomes a threat as no third party is involved to verify the authenticity of the devices before exchange of real information. Consequently, a reliable authentication mechanism is required to address the security issues in WiFi (wireless fidelity) Direct communication. In this paper, we propose a secure and lightweight mutual authentication and key agreement protocol for WiFi Direct. The principle of the protocol is based upon a commit/open pair and Diffie Hellman key exchange algorithm. It is observed from the simulations that the proposed protocol successfully authenticates the D2D devices in the WiFi Direct environment. Investigation through formal security analysis revealed the strong resistivity of the proposed protocol against the prominent attacks in the WiFi Direct environment. The comparative analysis demonstrates the reliability of the suggested protocol over the traditional one. The proposed protocol eliminates the occurrence of the denial of service (DoS) and man-in-the-middle (MITM) attacks in the discovery and key agreement phase, respectively. The proposed protocol can be easily integrated into the devices enabled with WiFi Direct and can offer a wide security package. Journal Article Computer Communications 169 114 128 Elsevier BV 0140-3664 Wi-Fi Direct, Device-to-Device communications, 5G, Internet of Things, Smart cities 1 3 2021 2021-03-01 10.1016/j.comcom.2021.01.010 COLLEGE NANME Mathematics and Computer Science School COLLEGE CODE MACS Swansea University 2022-10-31T14:52:21.9305389 2022-07-20T09:19:29.9456011 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science Gurjot Singh Gaba 0000-0002-0732-1478 1 Gulshan Kumar 0000-0003-0026-149x 2 Tai-Hoon Kim 3 Himanshu Monga 4 Pardeep Kumar 0000-0001-8124-5509 5 |
title |
Secure Device-to-Device communications for 5G enabled Internet of Things applications |
spellingShingle |
Secure Device-to-Device communications for 5G enabled Internet of Things applications Pardeep Kumar |
title_short |
Secure Device-to-Device communications for 5G enabled Internet of Things applications |
title_full |
Secure Device-to-Device communications for 5G enabled Internet of Things applications |
title_fullStr |
Secure Device-to-Device communications for 5G enabled Internet of Things applications |
title_full_unstemmed |
Secure Device-to-Device communications for 5G enabled Internet of Things applications |
title_sort |
Secure Device-to-Device communications for 5G enabled Internet of Things applications |
author_id_str_mv |
90a5efa66b9ae87756f5b059eb06ef1e |
author_id_fullname_str_mv |
90a5efa66b9ae87756f5b059eb06ef1e_***_Pardeep Kumar |
author |
Pardeep Kumar |
author2 |
Gurjot Singh Gaba Gulshan Kumar Tai-Hoon Kim Himanshu Monga Pardeep Kumar |
format |
Journal article |
container_title |
Computer Communications |
container_volume |
169 |
container_start_page |
114 |
publishDate |
2021 |
institution |
Swansea University |
issn |
0140-3664 |
doi_str_mv |
10.1016/j.comcom.2021.01.010 |
publisher |
Elsevier BV |
college_str |
Faculty of Science and Engineering |
hierarchytype |
|
hierarchy_top_id |
facultyofscienceandengineering |
hierarchy_top_title |
Faculty of Science and Engineering |
hierarchy_parent_id |
facultyofscienceandengineering |
hierarchy_parent_title |
Faculty of Science and Engineering |
department_str |
School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science |
document_store_str |
0 |
active_str |
0 |
description |
Smart cities are developed to optimize operations across the city such as waste and traffic management, water supply management, criminal tracking, and pollution monitoring, etc. Smart cities are formed by the interconnection of various Internet of Things (IoT) devices for collecting the data from objects and humans to perform necessary actions. But the challenge lies in the exchange of enormous information in real-time to drive smart city applications. Therefore, smart city applications make use of Device-to-Device (D2D) communications which provides higher bandwidth and lower latency in message exchanges. D2D communications do not need any infrastructure for communication and hence are cost and time effective. However, this advantage becomes a threat as no third party is involved to verify the authenticity of the devices before exchange of real information. Consequently, a reliable authentication mechanism is required to address the security issues in WiFi (wireless fidelity) Direct communication. In this paper, we propose a secure and lightweight mutual authentication and key agreement protocol for WiFi Direct. The principle of the protocol is based upon a commit/open pair and Diffie Hellman key exchange algorithm. It is observed from the simulations that the proposed protocol successfully authenticates the D2D devices in the WiFi Direct environment. Investigation through formal security analysis revealed the strong resistivity of the proposed protocol against the prominent attacks in the WiFi Direct environment. The comparative analysis demonstrates the reliability of the suggested protocol over the traditional one. The proposed protocol eliminates the occurrence of the denial of service (DoS) and man-in-the-middle (MITM) attacks in the discovery and key agreement phase, respectively. The proposed protocol can be easily integrated into the devices enabled with WiFi Direct and can offer a wide security package. |
published_date |
2021-03-01T20:13:22Z |
_version_ |
1821347154211373056 |
score |
11.04748 |