AAKA-D2D: Anonymous Authentication and Key Agreement Protocol in D2D Communications

dc.contributorAalto-yliopistofi
dc.contributorAalto Universityen
dc.contributor.authorWang, Mingjunen_US
dc.contributor.authorYan, Zhengen_US
dc.contributor.authorSong, B.en_US
dc.contributor.authorAtiquzzaman, M.en_US
dc.contributor.departmentXidian Universityen_US
dc.contributor.departmentNetwork Security and Trusten_US
dc.contributor.departmentUniversity of Central Oklahomaen_US
dc.contributor.departmentDepartment of Communications and Networkingen
dc.date.accessioned2020-05-07T12:40:35Z
dc.date.available2020-05-07T12:40:35Z
dc.date.issued2019en_US
dc.description.abstractDevice-to-Device (D2D) communication is proposed as a promising technology in 5G system for communications between mobile devices geographical proximity. Despite significant benefits, new application scenarios and system architecture, for instance, open direct channel, expose D2D communications to unique security threats. Providing a secure and privacy-preserving D2D communication system is essential for the success of D2D services. In this paper, we propose AAKA-D2D, an anonymous authentication and key agreement secure protocol for D2D communications, by which two User Equipments (UE) in close proximity could mutually authenticate without leaking their real identities and negotiate a session key for secure communications in D2D session without disclosing communication contents to Core Network (CN). Formal security analysis indicates that AAKA-D2D satisfies the security requirements. The comprehensive performance evaluation show that AAKA-D2D can increase the computational performance by about 20% and decrease on communication overhead by half compared to related works. © 2019 IEEE.en
dc.description.versionPeer revieweden
dc.format.extent1356-1362
dc.format.mimetypeapplication/pdfen_US
dc.identifier.citationWang , M , Yan , Z , Song , B & Atiquzzaman , M 2019 , AAKA-D2D: Anonymous Authentication and Key Agreement Protocol in D2D Communications . in 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation . , 9060128 , IEEE , pp. 1356-1362 , IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation , Leicester , United Kingdom , 19/08/2019 . https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00248en
dc.identifier.doi10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00248en_US
dc.identifier.isbn978-172814034-6
dc.identifier.otherPURE UUID: 174f3789-7be4-4fbf-a7ab-6dc65e6912acen_US
dc.identifier.otherPURE ITEMURL: https://research.aalto.fi/en/publications/174f3789-7be4-4fbf-a7ab-6dc65e6912acen_US
dc.identifier.otherPURE FILEURL: https://research.aalto.fi/files/42614521/ATC2019_AAKA_D2D_Wang_Yan_Song_Atiq3.pdfen_US
dc.identifier.urihttps://aaltodoc.aalto.fi/handle/123456789/44042
dc.identifier.urnURN:NBN:fi:aalto-202005073022
dc.language.isoenen
dc.relation.ispartofIEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovationen
dc.relation.ispartofseries2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovationen
dc.rightsopenAccessen
dc.subject.keywordAnonymous authenticationen_US
dc.subject.keywordDevice-to-Device Communicationsen_US
dc.subject.keywordKey agreementen_US
dc.subject.keywordPrivacy preservationen_US
dc.titleAAKA-D2D: Anonymous Authentication and Key Agreement Protocol in D2D Communicationsen
dc.typeConference article in proceedingsfi
dc.type.versionacceptedVersion
Files