Next Article in Journal
An Efficient Far-Field Wireless Power Transfer via Field Intensity Shaping Techniques
Next Article in Special Issue
A Simple and Robust Equalization Algorithm for Variable Modulation Systems
Previous Article in Journal
Review on Free-Space Optical Communications for Delay and Disruption Tolerant Networks
 
 
Article

Formal Verification of Authentication and Service Authorization Protocols in 5G-Enabled Device-to-Device Communications Using ProVerif

1
School of Science and Technology, Department of Computer Science, Middlesex University, London NW4 4BT, UK
2
School of Computing and Engineering, University of West London, London W5 5RF, UK
*
Author to whom correspondence should be addressed.
Academic Editor: Christos J. Bouras
Electronics 2021, 10(13), 1608; https://doi.org/10.3390/electronics10131608
Received: 22 May 2021 / Revised: 23 June 2021 / Accepted: 2 July 2021 / Published: 5 July 2021
(This article belongs to the Special Issue 5G and beyond Mobile and Satellite Communications)
Device-to-Device (D2D) communications will be used as an underlay technology in the Fifth Generation mobile network (5G), which will make network services of multiple Service Providers (SP) available anywhere. The end users will be allowed to access and share services using their User Equipments (UEs), and thus they will require seamless and secured connectivity. At the same time, Mobile Network Operators (MNOs) will use the UE to offload traffic and push contents closer to users relying on D2D communications network. This raises security concerns at different levels of the system architecture and highlights the need for robust authentication and authorization mechanisms to provide secure services access and sharing between D2D users. Therefore, this paper proposes a D2D level security solution that comprises two security protocols, namely, the D2D Service security (DDSec) and the D2D Attributes and Capability security (DDACap) protocols, to provide security for access, caching and sharing data in network-assisted and non-network-assisted D2D communications scenarios. The proposed solution applies Identity-based Encryption (IBE), Elliptic Curve Integrated Encryption Scheme (ECIES) and access control mechanisms for authentication and authorization procedures. We formally verified the proposed protocols using ProVerif and applied pi calculus. We also conducted a security analysis of the proposed protocols. View Full-Text
Keywords: 5G; D2D; security protocol; authentication; authorization; formal methods; ProVerif 5G; D2D; security protocol; authentication; authorization; formal methods; ProVerif
Show Figures

Figure 1

MDPI and ACS Style

Edris, E.K.K.; Aiash, M.; Loo, J. Formal Verification of Authentication and Service Authorization Protocols in 5G-Enabled Device-to-Device Communications Using ProVerif. Electronics 2021, 10, 1608. https://doi.org/10.3390/electronics10131608

AMA Style

Edris EKK, Aiash M, Loo J. Formal Verification of Authentication and Service Authorization Protocols in 5G-Enabled Device-to-Device Communications Using ProVerif. Electronics. 2021; 10(13):1608. https://doi.org/10.3390/electronics10131608

Chicago/Turabian Style

Edris, Ed Kamya Kiyemba, Mahdi Aiash, and Jonathan Loo. 2021. "Formal Verification of Authentication and Service Authorization Protocols in 5G-Enabled Device-to-Device Communications Using ProVerif" Electronics 10, no. 13: 1608. https://doi.org/10.3390/electronics10131608

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop