Security objectives based key management algorithm for device-to-device applications

×

Error message

  • User warning: The following theme is missing from the file system: journalijdr. For information about how to fix this, see the documentation page. in _drupal_trigger_error_with_delayed_logging() (line 1138 of /home2/journalijdr/public_html/includes/bootstrap.inc).
  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home2/journalijdr/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in _menu_load_objects() (line 579 of /home2/journalijdr/public_html/includes/menu.inc).

International Journal of Development Research

Volume: 
7
Article ID: 
9322
15 pages
Research Article

Security objectives based key management algorithm for device-to-device applications

Feras Masoud, Mohammad Alchaita, and Mohammad Assora

Abstract: 

D2D communications is the promising technology that is essential in the next generation of the mobile network. One of the basic restrictions of deploying this technique is the lack of security objectives which depends on user entities reliability and network capabilities; this issue imposes more expensive choices adopted by the network especially when user entities are out of coverage. Our work concentrated on designing the transmissions between the network and the out of coverage user entities to achieve a set of desired security requirements based on network policy applied by the SDN. The Key materials of MIKEY-SAKKE protocol are used to exchange the shared secure key, along with elliptic curve based Tate-Lichtenbaum pairing are used to achieve the security requirements. A bundle of security objectives is achieved represented by fundamental security objectives such as confidentiality, integrity and availability. The other security objectives such as the source/receiver non-repudiation, the avoidance of free riding attack and the privacy are also achieved

Download PDF: