SlideShare a Scribd company logo
1 of 21
A Lightweight and Secure Data Sharing Protocol
for D2D Communications
Atefeh Mohseni, Maedeh Ashouri, Mojtaba Mahdavi
1
14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 2
Outline
 Background
 Motivation and problem statement
 Related work
 Proposed scheme
 Results
 Summary
 Future work
14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 3
Background
“5G will be a new kind of network, supporting a vast
diversity of devices with unprecedented scale, speed and
complexity.
14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 4
Background
14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 5
 Motivation and problem
statement
14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 6
 Motivation and problem
statement
14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 7
 Motivation and problem
statement
 D2D applications:

 Local voice service
 Multimedia content sharing
 Gaming
 Group multicast
 Context-aware applications
 Public safety
14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 8
 Motivation and problem
statement
 D2D applications:

 Local voice service
 Multimedia content sharing
 Gaming
 Group multicast
 Context-aware applications
 Public safety
14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017
 Security threats
 Motivation and problem
statement
9
14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 10
 Motivation and problem
statement
 D2D communication vulnerabilities are due to:

 Direct wireless connection between devices
 A new relay transmission structure
 Mobility
 Privacy concerns

14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 11
 Our contributions


 Considering all the security requirements of data sharing

 Lightweight computation costs

 Compatible with mobility

14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017
 Related work


 Secure Data Sharing Strategy (SeDS)[1]

 Evolved Packet System Authentication and Key Agreement (EPS-
AKA)[2]

12
14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 13
Preliminaries:System Model
 Network Architecture of LTE-A networks
14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 14
Preliminaries:EPS-AKA
 Evolved Packet Core Authentication and Key Agreement scheme(EPS-AKA)
15
Proposed scheme
15
14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017
Results

 The comparison of computation overhead of our protocol and SeDS


16
14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017
Results

 Security Verification of the Proposed Protocol:
 Authentication and Key Agreement
 Confidentiality and Integrity
 Man-in-The-Middle Attack
 Replay Attack
 DoS Attack
 Impersonation Attack
 Free ridding Attack


17
14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017
Summary
 The proposed scheme:
 guarantees data confidentiality and integrity
 resists message fabrication, man-in-the-middle, replay and
DoS attacks
 The performance is acceptable by decreasing the
computation cost of users


18
14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017
Future work

 Consider a group-based model

 Adapt the scheme with (proximity-based services) ProSe


19
14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017
Reference
 [1] Zhang, Aiqing, et al., SeDS: Secure data sharing strategy for
D2D communication in LTE-Advanced networks, IEEE
Transactions on Vehicular Technology,Vol 65, pp 2659-2672,
2016

 [2] 3GPP, TR 33.401, v.14.2.0, Security Architecture, Release 14,
2017


20
14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017
 Thanks for your attention

 Any Question?



21

More Related Content

What's hot

Achieving efficient and privacy preserving cross-domain big data deduplicatio...
Achieving efficient and privacy preserving cross-domain big data deduplicatio...Achieving efficient and privacy preserving cross-domain big data deduplicatio...
Achieving efficient and privacy preserving cross-domain big data deduplicatio...Shakas Technologies
 
PhD Projects in Information Technology Research Guidance
PhD Projects in Information Technology Research GuidancePhD Projects in Information Technology Research Guidance
PhD Projects in Information Technology Research GuidancePhD Services
 
OTTO - Internet2 TechX 2017
OTTO - Internet2 TechX 2017OTTO - Internet2 TechX 2017
OTTO - Internet2 TechX 2017Mike Schwartz
 
Call for Papers - 6th International Conference on Cryptography and Informatio...
Call for Papers - 6th International Conference on Cryptography and Informatio...Call for Papers - 6th International Conference on Cryptography and Informatio...
Call for Papers - 6th International Conference on Cryptography and Informatio...IJNSA Journal
 
Privacy Techniques in Fourth Generation Heterogeneous Networks
Privacy Techniques in Fourth Generation Heterogeneous NetworksPrivacy Techniques in Fourth Generation Heterogeneous Networks
Privacy Techniques in Fourth Generation Heterogeneous Networksdimgkik
 
Cyber resilient infrastructure
Cyber resilient infrastructureCyber resilient infrastructure
Cyber resilient infrastructureAtkins
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...IJNSA Journal
 
Call for Paper - 9th International Conference of Security, Privacy and Trust ...
Call for Paper - 9th International Conference of Security, Privacy and Trust ...Call for Paper - 9th International Conference of Security, Privacy and Trust ...
Call for Paper - 9th International Conference of Security, Privacy and Trust ...ijcisjournal
 
Business uses for blockchain
Business uses for blockchainBusiness uses for blockchain
Business uses for blockchainAtkins
 
Cryptography and attacks ins
Cryptography and attacks insCryptography and attacks ins
Cryptography and attacks insAstha Parihar
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network securityManish Tiwari
 
Call for Papers - 9th International Conference of Security, Privacy and Trust...
Call for Papers - 9th International Conference of Security, Privacy and Trust...Call for Papers - 9th International Conference of Security, Privacy and Trust...
Call for Papers - 9th International Conference of Security, Privacy and Trust...IJNSA Journal
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtInfosecurity2010
 
SARoNGS project (Jens Jensen)
SARoNGS project (Jens Jensen)SARoNGS project (Jens Jensen)
SARoNGS project (Jens Jensen)JISC.AM
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conferenceJames Nesbitt
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...IJNSA Journal
 
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh NetworkSecurity Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Networkijtsrd
 
Blockchain to help armed forces.
Blockchain to help armed forces.Blockchain to help armed forces.
Blockchain to help armed forces.Blockchain Council
 

What's hot (20)

Achieving efficient and privacy preserving cross-domain big data deduplicatio...
Achieving efficient and privacy preserving cross-domain big data deduplicatio...Achieving efficient and privacy preserving cross-domain big data deduplicatio...
Achieving efficient and privacy preserving cross-domain big data deduplicatio...
 
PhD Projects in Information Technology Research Guidance
PhD Projects in Information Technology Research GuidancePhD Projects in Information Technology Research Guidance
PhD Projects in Information Technology Research Guidance
 
OTTO - Internet2 TechX 2017
OTTO - Internet2 TechX 2017OTTO - Internet2 TechX 2017
OTTO - Internet2 TechX 2017
 
Call for Papers - 6th International Conference on Cryptography and Informatio...
Call for Papers - 6th International Conference on Cryptography and Informatio...Call for Papers - 6th International Conference on Cryptography and Informatio...
Call for Papers - 6th International Conference on Cryptography and Informatio...
 
Privacy Techniques in Fourth Generation Heterogeneous Networks
Privacy Techniques in Fourth Generation Heterogeneous NetworksPrivacy Techniques in Fourth Generation Heterogeneous Networks
Privacy Techniques in Fourth Generation Heterogeneous Networks
 
Cyber resilient infrastructure
Cyber resilient infrastructureCyber resilient infrastructure
Cyber resilient infrastructure
 
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florerNtxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
 
ION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLSION Malta - DANE: The Future of TLS
ION Malta - DANE: The Future of TLS
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 
Call for Paper - 9th International Conference of Security, Privacy and Trust ...
Call for Paper - 9th International Conference of Security, Privacy and Trust ...Call for Paper - 9th International Conference of Security, Privacy and Trust ...
Call for Paper - 9th International Conference of Security, Privacy and Trust ...
 
Business uses for blockchain
Business uses for blockchainBusiness uses for blockchain
Business uses for blockchain
 
Cryptography and attacks ins
Cryptography and attacks insCryptography and attacks ins
Cryptography and attacks ins
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network security
 
Call for Papers - 9th International Conference of Security, Privacy and Trust...
Call for Papers - 9th International Conference of Security, Privacy and Trust...Call for Papers - 9th International Conference of Security, Privacy and Trust...
Call for Papers - 9th International Conference of Security, Privacy and Trust...
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
SARoNGS project (Jens Jensen)
SARoNGS project (Jens Jensen)SARoNGS project (Jens Jensen)
SARoNGS project (Jens Jensen)
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh NetworkSecurity Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Network
 
Blockchain to help armed forces.
Blockchain to help armed forces.Blockchain to help armed forces.
Blockchain to help armed forces.
 

Similar to A Lightweight and Secure Data Sharing Protocol for D2D Communication

Finsec innov-acts-open banking-london080319-4web
Finsec innov-acts-open banking-london080319-4webFinsec innov-acts-open banking-london080319-4web
Finsec innov-acts-open banking-london080319-4webinnov-acts-ltd
 
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...AJASTJournal
 
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...IJNSA Journal
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET Journal
 
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big data
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big dataMulti-dimensional cubic symmetric block cipher algorithm for encrypting big data
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big datajournalBEEI
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...IJASRD Journal
 
Implementation & Challenges of IPv6
Implementation & Challenges of IPv6Implementation & Challenges of IPv6
Implementation & Challenges of IPv6 Farwa Ansari
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEAM Publications,India
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...IJNSA Journal
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qcIAESIJEECS
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsAbdullah Alfadhly
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET Journal
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs IJECEIAES
 
Hybrid Security Network for Cloud Information Centre (HSNIC)
Hybrid Security Network for Cloud Information Centre (HSNIC)Hybrid Security Network for Cloud Information Centre (HSNIC)
Hybrid Security Network for Cloud Information Centre (HSNIC)Peace Asukwo
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Universitas Pembangunan Panca Budi
 

Similar to A Lightweight and Secure Data Sharing Protocol for D2D Communication (20)

Finsec innov-acts-open banking-london080319-4web
Finsec innov-acts-open banking-london080319-4webFinsec innov-acts-open banking-london080319-4web
Finsec innov-acts-open banking-london080319-4web
 
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
 
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
 
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big data
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big dataMulti-dimensional cubic symmetric block cipher algorithm for encrypting big data
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big data
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
 
Implementation & Challenges of IPv6
Implementation & Challenges of IPv6Implementation & Challenges of IPv6
Implementation & Challenges of IPv6
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs
 
Hybrid Security Network for Cloud Information Centre (HSNIC)
Hybrid Security Network for Cloud Information Centre (HSNIC)Hybrid Security Network for Cloud Information Centre (HSNIC)
Hybrid Security Network for Cloud Information Centre (HSNIC)
 
Internet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography SystemInternet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography System
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
 

Recently uploaded

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 

Recently uploaded (20)

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

A Lightweight and Secure Data Sharing Protocol for D2D Communication

  • 1. A Lightweight and Secure Data Sharing Protocol for D2D Communications Atefeh Mohseni, Maedeh Ashouri, Mojtaba Mahdavi 1
  • 2. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 2 Outline  Background  Motivation and problem statement  Related work  Proposed scheme  Results  Summary  Future work
  • 3. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 3 Background “5G will be a new kind of network, supporting a vast diversity of devices with unprecedented scale, speed and complexity.
  • 4. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 4 Background
  • 5. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 5  Motivation and problem statement
  • 6. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 6  Motivation and problem statement
  • 7. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 7  Motivation and problem statement  D2D applications:   Local voice service  Multimedia content sharing  Gaming  Group multicast  Context-aware applications  Public safety
  • 8. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 8  Motivation and problem statement  D2D applications:   Local voice service  Multimedia content sharing  Gaming  Group multicast  Context-aware applications  Public safety
  • 9. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017  Security threats  Motivation and problem statement 9
  • 10. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 10  Motivation and problem statement  D2D communication vulnerabilities are due to:   Direct wireless connection between devices  A new relay transmission structure  Mobility  Privacy concerns 
  • 11. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 11  Our contributions    Considering all the security requirements of data sharing   Lightweight computation costs   Compatible with mobility 
  • 12. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017  Related work    Secure Data Sharing Strategy (SeDS)[1]   Evolved Packet System Authentication and Key Agreement (EPS- AKA)[2]  12
  • 13. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 13 Preliminaries:System Model  Network Architecture of LTE-A networks
  • 14. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 14 Preliminaries:EPS-AKA  Evolved Packet Core Authentication and Key Agreement scheme(EPS-AKA)
  • 16. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 Results   The comparison of computation overhead of our protocol and SeDS   16
  • 17. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 Results   Security Verification of the Proposed Protocol:  Authentication and Key Agreement  Confidentiality and Integrity  Man-in-The-Middle Attack  Replay Attack  DoS Attack  Impersonation Attack  Free ridding Attack   17
  • 18. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 Summary  The proposed scheme:  guarantees data confidentiality and integrity  resists message fabrication, man-in-the-middle, replay and DoS attacks  The performance is acceptable by decreasing the computation cost of users   18
  • 19. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 Future work   Consider a group-based model   Adapt the scheme with (proximity-based services) ProSe   19
  • 20. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 Reference  [1] Zhang, Aiqing, et al., SeDS: Secure data sharing strategy for D2D communication in LTE-Advanced networks, IEEE Transactions on Vehicular Technology,Vol 65, pp 2659-2672, 2016   [2] 3GPP, TR 33.401, v.14.2.0, Security Architecture, Release 14, 2017   20
  • 21. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017  Thanks for your attention   Any Question?    21