Authors:
Othmane Nait Hamoud
1
;
Tayeb Kenaza
2
and
Yacine Challal
3
Affiliations:
1
Ecole Nationale Supérieure d’Informatique, BP 68M, 16309, Oued-Smar, Alger, Algérie, Ecole Militaire Polytechnique, BP 17 Bordj Elbahri, Alger and Algérie
;
2
Ecole Militaire Polytechnique, BP 17 Bordj Elbahri, Alger and Algérie
;
3
Ecole Nationale Supérieure d’Informatique, BP 68M, 16309, Oued-Smar, Alger, Algérie, Sorbonne Universités, Université de Technologie de Compiègne, Heudiasyc UMR CNRS 7253, Compiègne and France
Keyword(s):
Security, Device-to-Device Communication, Key Management Scheme, Certificateless Public Key Cryptography, Proximity Services, ProSe.
Related
Ontology
Subjects/Areas/Topics:
Applied Cryptography
;
Cryptographic Techniques and Key Management
;
Data and Application Security and Privacy
;
Data Engineering
;
Data Integrity
;
Data Protection
;
Databases and Data Security
;
Identification, Authentication and Non-Repudiation
;
Identity Management
;
Information and Systems Security
;
Network Security
;
Peer-To-Peer Security
;
Privacy
;
Privacy Enhancing Technologies
;
Security and Privacy in Complex Systems
;
Security and Privacy in Location-Based Services
;
Security and Privacy in Mobile Systems
;
Security Deployment
;
Security in Information Systems
;
Security Protocols
;
Security Requirements
;
Trust Management and Reputation Systems
;
Wireless Network Security
Abstract:
Device-to-Device (D2D) communication technology comes as one brick among many others in the construction of the evolving fifth generation system (5G) architecture. The Third Generation Partnership Project (3GPP) standardized D2D communication technology under the Proximity Services (ProSe) proposal. This technology allows enabling direct communication between proximate devices without passing through an infrastructure network. Security of D2D communications must be assured in all scenarios according to whether communication control is ensured by the Evolved Packet System (EPS) or the devices themselves. Certificateless public key cryptography (CL-PKC) is an interesting solution for securing D2D communications. In this paper, we propose a new CL-PKC construction to overcome security issues in all scenarios related to D2D communications and to deal with inherent conflicting security requirements between privacy, anonymity, and traceability by the use of multiple Key Generator Centers (
KGCs). This was considered particularly as responsibility decentralization between stakeholders to respond the fully mistrust assumption regarding KGCs. Furthermore, the proposed CL-PKC system can give different networks the opportunity to be compatible and to work cooperatively.
(More)