Loading [MathJax]/extensions/MathMenu.js
SDR Implementation of a D2D Security Cryptographic Mechanism | IEEE Journals & Magazine | IEEE Xplore

SDR Implementation of a D2D Security Cryptographic Mechanism


Security mechanism for D2D communication involving the usage of physical unclonable functions (PUF) and implemented on a Software Defined Radio (SDR) communication platfo...

Abstract:

Device-to-device (D2D) communication represents a promising technique to enable devices to communicate directly without the interaction of access points or base stations....Show More
Topic: D2D Communications: Security Issues and Resource Allocation

Abstract:

Device-to-device (D2D) communication represents a promising technique to enable devices to communicate directly without the interaction of access points or base stations. The ad hoc and proximity nature of this communication introduce some very important security vulnerabilities. Key management, access control, privacy, secure routing, and transmission need dedicated signaling procedures and optimized implementation mechanisms that are appropriate for the mobile, low-energy, and low-processing power environment. This paper proposes a security mechanism for D2D communication involving the use of physically unclonable functions (PUF) for unique key generation, elliptic-curve cryptography (ECC) and Diffie-Hellman key exchange (DHKE) for key management, and Salsa20/20 as stream cyphering encryption method, suitable for confidentiality of the wireless transmissions. All these methods are implemented and tested on a software defined radio (SDR) communication platform consisting of a Zync-based system-on-chip (SoC), complemented by radio frequency (RF) daughter boards from analog devices-an integration using hardware and software co-design.
Topic: D2D Communications: Security Issues and Resource Allocation
Security mechanism for D2D communication involving the usage of physical unclonable functions (PUF) and implemented on a Software Defined Radio (SDR) communication platfo...
Published in: IEEE Access ( Volume: 7)
Page(s): 38847 - 38855
Date of Publication: 14 March 2019
Electronic ISSN: 2169-3536
Citations are not available for this document.

Cites in Papers - |

Cites in Papers - IEEE (5)

Select All
1.
Adnan Shahid Khan, Yasir Javed, Rashad Mahmood Saqib, Zeeshan Ahmad, Johari Abdullah, Kartinah Zen, Irshad Ahmed Abbasi, Nayeem Ahmad Khan, "Lightweight Multifactor Authentication Scheme for NextGen Cellular Networks", IEEE Access, vol.10, pp.31273-31288, 2022.
2.
Sundus Ali, Muhammad Imran Aslam, Irfan Ahmed, Syed Abdul Aziz, Faraz Baig, Muhammad Daim Khan, Ammar Ahmed Khan, "Performance Analysis of Single-Hop Device to Device Communication", 2021 International Bhurban Conference on Applied Sciences and Technologies (IBCAST), pp.974-978, 2021.
3.
Luyao Yang, Wenli Shang, Chunyu Chen, Tianyu Wang, Zhoubin Liu, "Authentication Technology in Industrial Control System Based on Identity Password", 2020 39th Chinese Control Conference (CCC), pp.7677-7684, 2020.
4.
Cristinel Gavrilă, Vlad Popescu, Marian Alexandru, Maurizio Murroni, Claudio Sacchi, "An SDR-Based Satellite Gateway for Internet of Remote Things (IoRT) Applications", IEEE Access, vol.8, pp.115423-115436, 2020.
5.
M. Billmann, S. Werner, R. Höller, F. Praus, A. Puhm, N. Kerö, "Open-Source Crypto IP Cores for FPGAs – Overview and Evaluation", 2019 Austrochip Workshop on Microelectronics (Austrochip), pp.47-54, 2019.

Cites in Papers - Other Publishers (8)

1.
Houssem Benimam, Said Sadoudi, Djamal Teguig, " Software defined radio implementation of a secure waveform for real‐time data transmission using universal software radio peripheral ", SECURITY AND PRIVACY, 2022.
2.
Chiara Buratti, Erik Ström, Luca Feltrin, Laurent Clavier, Gordana Gardašević, Thomas Blazek, Lazar Berbakov, Titus Constantin Balan, Luis Orozco-Barbosa, Carles Anton-Haro, Piotr Rajchowski, Haibin Zhang, "IoT protocols, architectures, and applications", Inclusive Radio Communications for 5G and Beyond, pp.187, 2021.
3.
"Bibliography", Inclusive Radio Communications for 5G and Beyond, pp.305, 2021.
4.
Xuanxia Yao, Fadi Farha, Rongyang Li, Ismini Psychoula, Liming Chen, Huansheng Ning, "Security and privacy issues of physical objects in the IoT: Challenges and opportunities", Digital Communications and Networks, vol.7, no.3, pp.373, 2021.
5.
LuYao Yang, WeiMing Tong, ZhongWei Li, Tong Wu, "Authentication scheme for distributed industrial control system terminals", Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering, pp.1005, 2021.
6.
Man Chun Chow, Maode Ma, "A lightweight traceable D2D authentication and key agreement scheme in 5G cellular networks", Computers & Electrical Engineering, vol.95, pp.107375, 2021.
7.
Man Chun Chow, Maode Ma, "A Lightweight D2D Authentication Scheme against Free-riding Attacks in 5G Cellular Network", Proceedings of the 2020 2nd International Electronics Communication Conference, pp.143, 2020.
8.
Robert Basomingera, Young-June Choi, "Learning from Routing Information for Detecting Routing Misbehavior in Ad Hoc Networks", Sensors, vol.20, no.21, pp.6275, 2020.

References

References is not available for this document.