11,369 research outputs found

    Trust‑based lightweight security protocol for device to device multihop cellular communication (TLwS)

    Get PDF
    D2D communication is an integral part of LTE-Advance and 5G cellular networks, has gained a lot of popularity in recent years as it ofers high speed, extended coverage, and ubiquitous connectivity. Besides basic function that is direct communication without the need of Base Station (BS), D2D allows small communicating device to act as intermediate device not only for forward the trafcs but also permits the sharing of resources such as spectrum, services, data and social contents for any users that are near the proximity range. With the provision of devices to provide such services and act as authorization devices give rise to vulnerabilities in terms of security and trust, therefore secure mutual authentication is mandatory to mitigate any security threats. In this paper, certifcateless trust based lightweight security scheme (TLWS) for D2D multihop communication is proposed. This proposed scheme utilized elliptic curve and Elgamal cryptosystem assisted with secure hashing algorithm, timestamps, and blindfold challenge for secure communication and key agreements. In addition, we prove that TLWS provides secure mutual authentication using the broadly accepted Burrows–Abadi–Needham logic and shows that the proposed scheme is protected against replay attacks and Man in the middle attack. Overall, TLWS ofers better security and functionality features, and the communicationandcomputationaloverheadsarecomparablewiththerelatedschemes. Therefore, TLWS is applicable to mobile environment efciently

    On the security of software-defined next-generation cellular networks

    Get PDF
    In the recent years, mobile cellular networks are ndergoing fundamental changes and many established concepts are being revisited. Future 5G network architectures will be designed to employ a wide range of new and emerging technologies such as Software Defined Networking (SDN) and Network Functions Virtualization (NFV). These create new virtual network elements each affecting the logic of the network management and operation, enabling the creation of new generation services with substantially higher data rates and lower delays. However, new security challenges and threats are also introduced. Current Long-Term Evolution (LTE) networks are not able to accommodate these new trends in a secure and reliable way. At the same time, novel 5G systems have proffered invaluable opportunities of developing novel solutions for attack prevention, management, and recovery. In this paper, first we discuss the main security threats and possible attack vectors in cellular networks. Second, driven by the emerging next-generation cellular networks, we discuss the architectural and functional requirements to enable appropriate levels of security
    • …
    corecore