[1]程贤兵,蒋睿,裴蓓,等.5G网络中D2D安全动态群组认证和密钥协商协议[J].东南大学学报(自然科学版),2020,50(5):918-928.[doi:10.3969/j.issn.1001-0505.2020.05.018]
 Cheng Xianbing,Jiang Rui,Pei Bei,et al.Dynamic group authentication and key agreement protocol for D2D secure communication in 5G networks[J].Journal of Southeast University (Natural Science Edition),2020,50(5):918-928.[doi:10.3969/j.issn.1001-0505.2020.05.018]
点击复制

5G网络中D2D安全动态群组认证和密钥协商协议()
分享到:

《东南大学学报(自然科学版)》[ISSN:1001-0505/CN:32-1178/N]

卷:
50
期数:
2020年第5期
页码:
918-928
栏目:
信息与通信工程
出版日期:
2020-09-20

文章信息/Info

Title:
Dynamic group authentication and key agreement protocol for D2D secure communication in 5G networks
作者:
程贤兵1蒋睿1裴蓓2吴松洋2
1东南大学网络空间安全学院, 南京 210096; 2信息网络安全公安部重点实验室, 上海 200031
Author(s):
Cheng Xianbing1 Jiang Rui1 Pei Bei2 Wu Songyang2
1School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China
2Key Lab of Information Network Security, Ministry of Public Security, Shanghai 200031, China
关键词:
D2D通信 认证 密钥协商 动态群组
Keywords:
device-to-device(D2D)communication authentication key agreement dynamic group
分类号:
TN918.4
DOI:
10.3969/j.issn.1001-0505.2020.05.018
摘要:
为了解决5G网络中设备到设备(D2D)的群组通信中常见的安全威胁,提出了确保D2D安全通信的动态群组认证和密钥协商(DG-AKA)协议方案.结果表明:该方案基于CDH假设难题实现了安全的认证,使得非法用户无法伪造签名;基于MDBDH假设难题并结合安全认证过程实现了安全的密钥协商,使得非法用户或核心网络无法获取共享会话密钥,保证了密钥的安全性,解决了密钥托管问题;结合认证和密钥协商过程实现了安全的动态群组成员管理以保证群组前向和后向安全,当群组成员被撤销或新成员加入时,无需重新执行全部协议,即能安全地更新会话密钥.安全性分析证明了DG-AKA协议方案满足所有安全性目标,效率分析则表明了该方案具有和现有方案同等数量级的运行效率.
Abstract:
To solve common secure challenges in device-to-device(D2D)group communication in 5G networks, a dynamic group-authentication and key agreement(DG-AKA)protocol scheme for ensuring D2D secure communication was proposed. The results show that the security authentication can be implemented based on the Diffie-Hellman(CDH)hypothesis problem, so illegal users cannot forge signatures. Based on the MDBDH hypothesis problem and the security authentication process, a secure key agreement can be implemented, preventing illegal users or the core network to obtain the shared session key, thus the security of the key is ensured and the key escrow problem is solved. Combined with the authentication and key agreement process, a secure dynamic group member management can be implemented to ensure the group forward and backward secrecy. When group members are revoked or new members join the system, the session key is safely updated without re-executing the entire protocol. The security analysis proves that DG-AKA protocol scheme meets all safety objectives, and the efficiency analysis shows that the scheme has the same order of operation efficiency as the existing schemes.

参考文献/References:

[1] Doppler K,Rinne M, Wijting C, et al. Device-to-device communication as an underlay to LTE-advanced networks[J]. IEEE Communications Magazine, 2009, 47(12): 42-49. DOI:10.1109/mcom.2009.5350367.
[2] Doppler K, Yu C H, Ribeiro C B, et al. Mode selection for device-to-device communication underlaying an LTE-advanced network[C]//2010 IEEE Wireless Communication and Networking Conference. Sydney, Australia, 2010: 1-6. DOI:10.1109/wcnc.2010.5506248.
[3] Lei L,Zhong Z D, Lin C, et al. Operator controlled device-to-device communications in LTE-advanced networks[J]. IEEE Wireless Communications, 2012, 19(3): 96-104. DOI:10.1109/mwc.2012.6231164.
[4] Wu X Z,Tavildar S, Shakkottai S, et al. FlashLinQ: A synchronous distributed scheduler for peer-to-peer ad hoc networks[J]. ACM Transactions on Networking, 2013, 21(4): 1215-1228. DOI:10.1109/tnet.2013.2264633.
[5] Gamage A T, Liang H, Zhang R, et al. Device-to-device communication underlaying converged heterogeneous networks[J]. IEEE Wireless Communications, 2014, 21(6): 98-107. DOI:10.1109/mwc.2014.7000977.
[6] Janis P, Yu C H, Doppler K, et al. Device-to-device communication underlaying cellular communications systems[J]. International Journal of Communications, Network and System Sciences, 2009, 2(3): 169-178. DOI:10.4236/ijcns.2009.23019.
[7] Alam M, Yang D, Rodriguez J, et al. Secure device-to-device communication in LTE-A[J]. IEEE Communications Magazine, 2014, 52(4): 66-73.
[8] Shen W L, Hong W S, Cao X H, et al. Secure key establishment for Device-to-Device communications[C]//2014 IEEE Global Communications Conference. Austin, TX, USA, 2014: 336-340. DOI:10.1109/glocom.2014.7036830.
[9] Sedidi R, Kumar A. Key exchange protocols for secure device-to-device(D2D)communication in 5G[C]//2016 Wireless Days(WD). Toulouse, France, 2016: 1-6. DOI:10.1109/wd.2016.7461477.
[10] Wang M J, Yan Z,Niemi V. UAKA-D2D: Universal authentication and key agreement protocol in D2D communications[J]. Mobile Networks and Applications, 2017, 22(3): 510-525. DOI:10.1007/s11036-017-0870-5.
[11] Guo J J, Ma J F, Li X H, et al. An attribute-based trust negotiation protocol for D2D communication in smart city balancing trust and privacy[J]. Information Science and Engineering, 2017, 33(4):1007-1023. DOI: 10.6688/JISE.2017.33.4.10.
[12] Zhang A Q, Wang L, Ye X R, et al. Light-weight and robust security-aware D2D-assist data transmission protocol for mobile-health systems[J].IEEE Transactions on Information Forensics and Security, 2017, 12(3): 662-675. DOI:10.1109/tifs.2016.2631950.
[13] Zhang A Q, Chen J X, Hu R Q, et al. SeDS: Secure data sharing strategy for D2D communication in LTE-advanced networks[J]. IEEE Transactions on Vehicular Technology, 2016, 65(4): 2659-2672. DOI:10.1109/tvt.2015.2416002.
[14] Hsu R H, Lee J,Quek T Q S, et al. GRAAD: Group anonymous and accountable D2D communication in mobile networks[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(2): 449-464. DOI:10.1109/tifs.2017.2756567.
[15] Hsu R H, Lee J. Group anonymous D2D communication with end-to-end security in LTE-A[C]//2015 IEEE Conference on Communications and Network Security(CNS). Florence, Italy, 2015: 451–459. DOI:10.1109/cns.2015.7346857.
[16] Tan H W, Song Y Z, Xuan S C, et al. Secure D2D group authentication employing smartphone sensor behavior analysis[J].Symmetry, 2019, 11(8): 969. DOI:10.3390/sym11080969.
[17] Wang M J, Yan Z. Privacy-preserving authentication and key agreement protocols for D2D group communications[J].IEEE Transactions on Industrial Informatics, 2018, 14(8): 3637-3647. DOI:10.1109/tii.2017.2778090.
[18] Wang L J, Tian Y L, Zhang D, et al. Constant-round authenticated and dynamic group key agreement protocol for D2D group communications[J].Information Sciences, 2019, 503: 61-71. DOI:10.1016/j.ins.2019.06.067.
[19] Mustafa U, Philip N. Group-based key exchange for medical IoT device-to-device communication(D2D)combining secret sharing and physical layer key exchange[C]//2019 IEEE 12th International Conference on Global Security, Safety and Sustainability(ICGS3). London, United Kingdom, 2019: 42-48. DOI:10.1109/icgs3.2019.8688022.
[20] Steinfeld R, Bull L, Wang H X, et al. Universal designated-verifier signatures[M]//Advances in Cryptology-ASIACRYPT 2003. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003, 2894: 523-542. DOI:10.1007/978-3-540-40061-5_33.
[21] Choi K Y, Hwang J Y, Lee D H. Efficient ID-based group key agreement with bilinear maps[M]//Public Key Cryptography-PKC 2004. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004, 2947: 130-144. DOI:10.1007/978-3-540-24632-9_10.
[22] Wang J M, Lang B. An efficient KP-ABE scheme for content protection in Information-Centric Networking[C]//2016 IEEE Symposium on Computers and Communication(ISCC). Messina, Italy, 2016: 830-837. DOI:10.1109/iscc.2016.7543839.

相似文献/References:

[1]宋宇波,陈开志,姚冰心.基于自我加密的无线局域网快速切换认证[J].东南大学学报(自然科学版),2007,37(6):945.[doi:10.3969/j.issn.1001-0505.2007.06.001]
 Song Yubo,Chen Kaizhi,Yao Bingxin.Fast handoff authentication scheme of WLAN based on self-encryption[J].Journal of Southeast University (Natural Science Edition),2007,37(5):945.[doi:10.3969/j.issn.1001-0505.2007.06.001]
[2]邢媛,蒋睿.基于串空间模型的UMTS AKA协议安全分析与改进[J].东南大学学报(自然科学版),2010,40(6):1163.[doi:10.3969/j.issn.1001-0505.2010.06.007]
 Xing Yuan,Jiang Rui.Security analysis and improvement of UMTS AKA protocol based on strand space model[J].Journal of Southeast University (Natural Science Edition),2010,40(5):1163.[doi:10.3969/j.issn.1001-0505.2010.06.007]

备注/Memo

备注/Memo:
收稿日期: 2020-01-15.
作者简介: 程贤兵(1995—),男,硕士生;蒋睿(联系人),男,博士,副教授,R.Jiang@seu.edu.cn.
基金项目: 国家自然科学基金资助项目(61372103)、江苏省自然科学基金资助项目(SBK2020020282)、信息网络安全公安部重点实验室开放课题资助项目(C19607)、江苏省计算机网络技术重点实验室资助项目.
引用本文: 程贤兵,蒋睿,裴蓓,等.5G网络中D2D安全动态群组认证和密钥协商协议[J].东南大学学报(自然科学版),2020,50(5):918-928. DOI:10.3969/j.issn.1001-0505.2020.05.018.
更新日期/Last Update: 2020-09-20