IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v11y2019i5p108-d228980.html
   My bibliography  Save this article

A Lightweight Elliptic-Elgamal-Based Authentication Scheme for Secure Device-to-Device Communication

Author

Listed:
  • Adeel Abro

    (School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China)

  • Zhongliang Deng

    (School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China)

  • Kamran Ali Memon

    (School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China)

Abstract

Device-to-Device (D2D) is a major part of 5G that will facilitate deployments with extended coverage where devices can act as users or relays. These relays normally act as decode and forward relays (semi-intelligent devices) with limited computational and storage capabilities. However, introducing such a technology, where users can act as relays, presents a wide range of security threats, in particular, rogue relay devices or man in the middle attacks (M-I-T-M). Second, passing fewer control messages is always advisable when considering authenticity and secrecy. To mitigate M-I-T-M and to reduce communication costs, this paper presents a lightweight elliptic-ElGamal-based authentication scheme using PKI (FHEEP) in D2D communication. Pollard’s rho and Baby Step, Giant Step (BSGS) methods are used to evaluate the authenticity and secrecy of our proposed scheme. The communication cost is calculated based on the comparative analysis indicating that our proposed scheme outperforms the baseline protocol. The proposed scheme can be used for any infrastructure architecture that will enhance the security of any D2D settings with better performance.

Suggested Citation

  • Adeel Abro & Zhongliang Deng & Kamran Ali Memon, 2019. "A Lightweight Elliptic-Elgamal-Based Authentication Scheme for Secure Device-to-Device Communication," Future Internet, MDPI, vol. 11(5), pages 1-13, May.
  • Handle: RePEc:gam:jftint:v:11:y:2019:i:5:p:108-:d:228980
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/11/5/108/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/11/5/108/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Sarmadullah Khan & Rafiullah Khan, 2018. "Elgamal Elliptic Curve Based Secure Communication Architecture for Microgrids," Energies, MDPI, vol. 11(4), pages 1-14, March.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Angshuman Khan & Rupayan Das, 2022. "Security aspects of device-to-device (D2D) networks in wireless communication: a comprehensive survey," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 81(4), pages 625-642, December.
    2. Adel A. Ahmed & Sharaf J. Malebary & Waleed Ali & Ahmed A. Alzahrani, 2023. "A Provable Secure Cybersecurity Mechanism Based on Combination of Lightweight Cryptography and Authentication for Internet of Things," Mathematics, MDPI, vol. 11(1), pages 1-24, January.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Ismail Aouichak & Sébastien Jacques & Sébastien Bissey & Cédric Reymond & Téo Besson & Jean-Charles Le Bunetel, 2022. "A Bidirectional Grid-Connected DC–AC Converter for Autonomous and Intelligent Electricity Storage in the Residential Sector," Energies, MDPI, vol. 15(3), pages 1-19, February.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:11:y:2019:i:5:p:108-:d:228980. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.