Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
A Lightweight and Secure Data Sharing Protocol for D2D Communication
1. A Lightweight and Secure Data Sharing Protocol
for D2D Communications
Atefeh Mohseni, Maedeh Ashouri, Mojtaba Mahdavi
1
2. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 2
Outline
Background
Motivation and problem statement
Related work
Proposed scheme
Results
Summary
Future work
3. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 3
Background
“5G will be a new kind of network, supporting a vast
diversity of devices with unprecedented scale, speed and
complexity.
4. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 4
Background
5. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 5
Motivation and problem
statement
6. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 6
Motivation and problem
statement
7. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 7
Motivation and problem
statement
D2D applications:
Local voice service
Multimedia content sharing
Gaming
Group multicast
Context-aware applications
Public safety
8. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 8
Motivation and problem
statement
D2D applications:
Local voice service
Multimedia content sharing
Gaming
Group multicast
Context-aware applications
Public safety
9. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017
Security threats
Motivation and problem
statement
9
10. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 10
Motivation and problem
statement
D2D communication vulnerabilities are due to:
Direct wireless connection between devices
A new relay transmission structure
Mobility
Privacy concerns
11. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 11
Our contributions
Considering all the security requirements of data sharing
Lightweight computation costs
Compatible with mobility
12. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017
Related work
Secure Data Sharing Strategy (SeDS)[1]
Evolved Packet System Authentication and Key Agreement (EPS-
AKA)[2]
12
13. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 13
Preliminaries:System Model
Network Architecture of LTE-A networks
14. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017 14
Preliminaries:EPS-AKA
Evolved Packet Core Authentication and Key Agreement scheme(EPS-AKA)
16. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017
Results
The comparison of computation overhead of our protocol and SeDS
16
17. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017
Results
Security Verification of the Proposed Protocol:
Authentication and Key Agreement
Confidentiality and Integrity
Man-in-The-Middle Attack
Replay Attack
DoS Attack
Impersonation Attack
Free ridding Attack
17
18. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017
Summary
The proposed scheme:
guarantees data confidentiality and integrity
resists message fabrication, man-in-the-middle, replay and
DoS attacks
The performance is acceptable by decreasing the
computation cost of users
18
19. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017
Future work
Consider a group-based model
Adapt the scheme with (proximity-based services) ProSe
19
20. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017
Reference
[1] Zhang, Aiqing, et al., SeDS: Secure data sharing strategy for
D2D communication in LTE-Advanced networks, IEEE
Transactions on Vehicular Technology,Vol 65, pp 2659-2672,
2016
[2] 3GPP, TR 33.401, v.14.2.0, Security Architecture, Release 14,
2017
20
21. 14th Int. ISC Conference on Information Security and Cryptography- Shiraz University, 2017
Thanks for your attention
Any Question?
21