Next Article in Journal
Novel Approach to Task Scheduling and Load Balancing Using the Dominant Sequence Clustering and Mean Shift Clustering Algorithms
Previous Article in Journal
An Extensible Automated Failure Localization Framework Using NetKAT, Felix, and SDN Traceroute
Article Menu
Issue 5 (May) cover image

Export Article

Open AccessArticle

A Lightweight Elliptic-Elgamal-Based Authentication Scheme for Secure Device-to-Device Communication

School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Future Internet 2019, 11(5), 108; https://doi.org/10.3390/fi11050108
Received: 13 March 2019 / Revised: 16 April 2019 / Accepted: 26 April 2019 / Published: 7 May 2019
(This article belongs to the Section Internet of Things)
  |  
PDF [1418 KB, uploaded 7 May 2019]
  |  

Abstract

Device-to-Device (D2D) is a major part of 5G that will facilitate deployments with extended coverage where devices can act as users or relays. These relays normally act as decode and forward relays (semi-intelligent devices) with limited computational and storage capabilities. However, introducing such a technology, where users can act as relays, presents a wide range of security threats, in particular, rogue relay devices or man in the middle attacks (M-I-T-M). Second, passing fewer control messages is always advisable when considering authenticity and secrecy. To mitigate M-I-T-M and to reduce communication costs, this paper presents a lightweight elliptic-ElGamal-based authentication scheme using PKI (FHEEP) in D2D communication. Pollard’s rho and Baby Step, Giant Step (BSGS) methods are used to evaluate the authenticity and secrecy of our proposed scheme. The communication cost is calculated based on the comparative analysis indicating that our proposed scheme outperforms the baseline protocol. The proposed scheme can be used for any infrastructure architecture that will enhance the security of any D2D settings with better performance. View Full-Text
Keywords: 5G; D2D; lightweight authentication scheme; elliptic curve cryptography; ElGamal; Man-in-the-middle attack 5G; D2D; lightweight authentication scheme; elliptic curve cryptography; ElGamal; Man-in-the-middle attack
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Abro, A.; Deng, Z.; Memon, K.A. A Lightweight Elliptic-Elgamal-Based Authentication Scheme for Secure Device-to-Device Communication. Future Internet 2019, 11, 108.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Future Internet EISSN 1999-5903 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top