Loading…

Group authentication protocol based on aggregated signatures for D2D communication

Device-to-device (D2D) communication is one of the most promising technologies of new mobile communication networks (5G), and essential for the Communicating Things Networks (CTNs) paradigm. Its application scope has been widened and billions of devices are expected to be communicating in the next y...

Full description

Saved in:
Bibliographic Details
Published in:Computer networks (Amsterdam, Netherlands : 1999) Netherlands : 1999), 2020-09, Vol.178, p.107192, Article 107192
Main Authors: Lopes, Ana Paula Golembiouski, Gondim, Paulo R.L.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c334t-e47b1d3240d32ed9d26bf5b4abac0c47cafe42d53a4792d76dc1c9b9932128e3
cites cdi_FETCH-LOGICAL-c334t-e47b1d3240d32ed9d26bf5b4abac0c47cafe42d53a4792d76dc1c9b9932128e3
container_end_page
container_issue
container_start_page 107192
container_title Computer networks (Amsterdam, Netherlands : 1999)
container_volume 178
creator Lopes, Ana Paula Golembiouski
Gondim, Paulo R.L.
description Device-to-device (D2D) communication is one of the most promising technologies of new mobile communication networks (5G), and essential for the Communicating Things Networks (CTNs) paradigm. Its application scope has been widened and billions of devices are expected to be communicating in the next years. Moreover, goals, such as end-to-end security and reductions in computational costs required by resource-constrained devices, must be accomplished for its full implementation.  The Third Generation Partnership Project (3GPP) standardized authentication and key agreement (AKA) protocols are not suitable for D2D due to differences in the architecture and communication scenario. They may cause several security issues and excessive computational and transmission overhead, since they require individual executions for each pair of devices. The development of AKA protocols adapted to D2D group communication is still in its initial steps. This article introduces a new authentication and key agreement protocol for D2D groups of devices based on asymmetric cryptography and aggregated signatures. The scheme focuses on robust security and reductions in computational and communication costs. It was compared to other group AKA protocols and yielded better results regarding security and overhead reduction. A formal validation conducted by Automated Validation of Internet Security Protocols and Applications tool (AVISPA) proved its robustness.
doi_str_mv 10.1016/j.comnet.2020.107192
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2478822145</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S1389128619313076</els_id><sourcerecordid>2478822145</sourcerecordid><originalsourceid>FETCH-LOGICAL-c334t-e47b1d3240d32ed9d26bf5b4abac0c47cafe42d53a4792d76dc1c9b9932128e3</originalsourceid><addsrcrecordid>eNp9UE1LAzEQDaJgrf4DDwuetybZdLO5CNJqFQqC9B6yyeyapU1qkhX896Zsz17m4zFvZt5D6J7gBcGkfhwW2h8cpAXF9ARxIugFmpGG05LjWlzmumpESWhTX6ObGAeMMWO0maHPTfDjsVBj-gKXrFbJelccg09e-33RqgimyIjq-wC9SrmLtncqjQFi0flQrOm6yOcPozuzb9FVp_YR7s55jnavL7vVW7n92LyvnrelriqWSmC8JaaiDOcARhhat92yZapVGmvGteqAUbOsFOOCGl4bTbRohaho1gHVHD1Ma_Oz3yPEJAc_BpcvSsp401BK2DJPsWlKBx9jgE4egz2o8CsJlifz5CAn8-TJPDmZl2lPEw2ygB8LQUZtwWkwNoBO0nj7_4I_3nV67w</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2478822145</pqid></control><display><type>article</type><title>Group authentication protocol based on aggregated signatures for D2D communication</title><source>Library &amp; Information Science Abstracts (LISA)</source><source>ScienceDirect Journals</source><creator>Lopes, Ana Paula Golembiouski ; Gondim, Paulo R.L.</creator><creatorcontrib>Lopes, Ana Paula Golembiouski ; Gondim, Paulo R.L.</creatorcontrib><description>Device-to-device (D2D) communication is one of the most promising technologies of new mobile communication networks (5G), and essential for the Communicating Things Networks (CTNs) paradigm. Its application scope has been widened and billions of devices are expected to be communicating in the next years. Moreover, goals, such as end-to-end security and reductions in computational costs required by resource-constrained devices, must be accomplished for its full implementation.  The Third Generation Partnership Project (3GPP) standardized authentication and key agreement (AKA) protocols are not suitable for D2D due to differences in the architecture and communication scenario. They may cause several security issues and excessive computational and transmission overhead, since they require individual executions for each pair of devices. The development of AKA protocols adapted to D2D group communication is still in its initial steps. This article introduces a new authentication and key agreement protocol for D2D groups of devices based on asymmetric cryptography and aggregated signatures. The scheme focuses on robust security and reductions in computational and communication costs. It was compared to other group AKA protocols and yielded better results regarding security and overhead reduction. A formal validation conducted by Automated Validation of Internet Security Protocols and Applications tool (AVISPA) proved its robustness.</description><identifier>ISSN: 1389-1286</identifier><identifier>EISSN: 1872-7069</identifier><identifier>DOI: 10.1016/j.comnet.2020.107192</identifier><language>eng</language><publisher>Amsterdam: Elsevier B.V</publisher><subject>Communication ; Communication networks ; Computing costs ; Cryptography ; CTN ; Device-to-device communication ; Devices ; Group authentication ; Group communication ; Mobile communication systems ; Protocol (computers) ; Proximity services ; Security ; Signatures</subject><ispartof>Computer networks (Amsterdam, Netherlands : 1999), 2020-09, Vol.178, p.107192, Article 107192</ispartof><rights>2020 Elsevier B.V.</rights><rights>Copyright Elsevier Sequoia S.A. Sep 4, 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c334t-e47b1d3240d32ed9d26bf5b4abac0c47cafe42d53a4792d76dc1c9b9932128e3</citedby><cites>FETCH-LOGICAL-c334t-e47b1d3240d32ed9d26bf5b4abac0c47cafe42d53a4792d76dc1c9b9932128e3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925,34135</link.rule.ids></links><search><creatorcontrib>Lopes, Ana Paula Golembiouski</creatorcontrib><creatorcontrib>Gondim, Paulo R.L.</creatorcontrib><title>Group authentication protocol based on aggregated signatures for D2D communication</title><title>Computer networks (Amsterdam, Netherlands : 1999)</title><description>Device-to-device (D2D) communication is one of the most promising technologies of new mobile communication networks (5G), and essential for the Communicating Things Networks (CTNs) paradigm. Its application scope has been widened and billions of devices are expected to be communicating in the next years. Moreover, goals, such as end-to-end security and reductions in computational costs required by resource-constrained devices, must be accomplished for its full implementation.  The Third Generation Partnership Project (3GPP) standardized authentication and key agreement (AKA) protocols are not suitable for D2D due to differences in the architecture and communication scenario. They may cause several security issues and excessive computational and transmission overhead, since they require individual executions for each pair of devices. The development of AKA protocols adapted to D2D group communication is still in its initial steps. This article introduces a new authentication and key agreement protocol for D2D groups of devices based on asymmetric cryptography and aggregated signatures. The scheme focuses on robust security and reductions in computational and communication costs. It was compared to other group AKA protocols and yielded better results regarding security and overhead reduction. A formal validation conducted by Automated Validation of Internet Security Protocols and Applications tool (AVISPA) proved its robustness.</description><subject>Communication</subject><subject>Communication networks</subject><subject>Computing costs</subject><subject>Cryptography</subject><subject>CTN</subject><subject>Device-to-device communication</subject><subject>Devices</subject><subject>Group authentication</subject><subject>Group communication</subject><subject>Mobile communication systems</subject><subject>Protocol (computers)</subject><subject>Proximity services</subject><subject>Security</subject><subject>Signatures</subject><issn>1389-1286</issn><issn>1872-7069</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>F2A</sourceid><recordid>eNp9UE1LAzEQDaJgrf4DDwuetybZdLO5CNJqFQqC9B6yyeyapU1qkhX896Zsz17m4zFvZt5D6J7gBcGkfhwW2h8cpAXF9ARxIugFmpGG05LjWlzmumpESWhTX6ObGAeMMWO0maHPTfDjsVBj-gKXrFbJelccg09e-33RqgimyIjq-wC9SrmLtncqjQFi0flQrOm6yOcPozuzb9FVp_YR7s55jnavL7vVW7n92LyvnrelriqWSmC8JaaiDOcARhhat92yZapVGmvGteqAUbOsFOOCGl4bTbRohaho1gHVHD1Ma_Oz3yPEJAc_BpcvSsp401BK2DJPsWlKBx9jgE4egz2o8CsJlifz5CAn8-TJPDmZl2lPEw2ygB8LQUZtwWkwNoBO0nj7_4I_3nV67w</recordid><startdate>20200904</startdate><enddate>20200904</enddate><creator>Lopes, Ana Paula Golembiouski</creator><creator>Gondim, Paulo R.L.</creator><general>Elsevier B.V</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>E3H</scope><scope>F2A</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20200904</creationdate><title>Group authentication protocol based on aggregated signatures for D2D communication</title><author>Lopes, Ana Paula Golembiouski ; Gondim, Paulo R.L.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c334t-e47b1d3240d32ed9d26bf5b4abac0c47cafe42d53a4792d76dc1c9b9932128e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Communication</topic><topic>Communication networks</topic><topic>Computing costs</topic><topic>Cryptography</topic><topic>CTN</topic><topic>Device-to-device communication</topic><topic>Devices</topic><topic>Group authentication</topic><topic>Group communication</topic><topic>Mobile communication systems</topic><topic>Protocol (computers)</topic><topic>Proximity services</topic><topic>Security</topic><topic>Signatures</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lopes, Ana Paula Golembiouski</creatorcontrib><creatorcontrib>Gondim, Paulo R.L.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>Library &amp; Information Sciences Abstracts (LISA)</collection><collection>Library &amp; Information Science Abstracts (LISA)</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computer networks (Amsterdam, Netherlands : 1999)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lopes, Ana Paula Golembiouski</au><au>Gondim, Paulo R.L.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Group authentication protocol based on aggregated signatures for D2D communication</atitle><jtitle>Computer networks (Amsterdam, Netherlands : 1999)</jtitle><date>2020-09-04</date><risdate>2020</risdate><volume>178</volume><spage>107192</spage><pages>107192-</pages><artnum>107192</artnum><issn>1389-1286</issn><eissn>1872-7069</eissn><abstract>Device-to-device (D2D) communication is one of the most promising technologies of new mobile communication networks (5G), and essential for the Communicating Things Networks (CTNs) paradigm. Its application scope has been widened and billions of devices are expected to be communicating in the next years. Moreover, goals, such as end-to-end security and reductions in computational costs required by resource-constrained devices, must be accomplished for its full implementation.  The Third Generation Partnership Project (3GPP) standardized authentication and key agreement (AKA) protocols are not suitable for D2D due to differences in the architecture and communication scenario. They may cause several security issues and excessive computational and transmission overhead, since they require individual executions for each pair of devices. The development of AKA protocols adapted to D2D group communication is still in its initial steps. This article introduces a new authentication and key agreement protocol for D2D groups of devices based on asymmetric cryptography and aggregated signatures. The scheme focuses on robust security and reductions in computational and communication costs. It was compared to other group AKA protocols and yielded better results regarding security and overhead reduction. A formal validation conducted by Automated Validation of Internet Security Protocols and Applications tool (AVISPA) proved its robustness.</abstract><cop>Amsterdam</cop><pub>Elsevier B.V</pub><doi>10.1016/j.comnet.2020.107192</doi></addata></record>
fulltext fulltext
identifier ISSN: 1389-1286
ispartof Computer networks (Amsterdam, Netherlands : 1999), 2020-09, Vol.178, p.107192, Article 107192
issn 1389-1286
1872-7069
language eng
recordid cdi_proquest_journals_2478822145
source Library & Information Science Abstracts (LISA); ScienceDirect Journals
subjects Communication
Communication networks
Computing costs
Cryptography
CTN
Device-to-device communication
Devices
Group authentication
Group communication
Mobile communication systems
Protocol (computers)
Proximity services
Security
Signatures
title Group authentication protocol based on aggregated signatures for D2D communication
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T10%3A02%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Group%20authentication%20protocol%20based%20on%20aggregated%20signatures%20for%20D2D%20communication&rft.jtitle=Computer%20networks%20(Amsterdam,%20Netherlands%20:%201999)&rft.au=Lopes,%20Ana%20Paula%20Golembiouski&rft.date=2020-09-04&rft.volume=178&rft.spage=107192&rft.pages=107192-&rft.artnum=107192&rft.issn=1389-1286&rft.eissn=1872-7069&rft_id=info:doi/10.1016/j.comnet.2020.107192&rft_dat=%3Cproquest_cross%3E2478822145%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c334t-e47b1d3240d32ed9d26bf5b4abac0c47cafe42d53a4792d76dc1c9b9932128e3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2478822145&rft_id=info:pmid/&rfr_iscdi=true