Security issues in 5G device to device communication

5G is a promising technology that will support high connectivity and device to device communication. It also promises to improve the existing technologies and will support them. Existing LTE-A utilize centralized communication scheme where all the authentication mechanisms need to go through the bas...

Full description

Saved in:
Bibliographic Details
Main Authors: Khan, A.S., Yasir, Javed, Johari, Abdullah, Nazim, J.M., Khan, N.
Format: Article
Language:English
Published: IJCSNS 2017
Subjects:
Online Access:http://ir.unimas.my/id/eprint/17236/1/Security%20issues%20in%205G%20device%20to%20device%20communication%20%28abstract%29.pdf
http://ir.unimas.my/id/eprint/17236/
https://www.researchgate.net/publication/317822249
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Malaysia Sarawak
Language: English
id my.unimas.ir.17236
record_format eprints
spelling my.unimas.ir.172362024-01-09T03:47:08Z http://ir.unimas.my/id/eprint/17236/ Security issues in 5G device to device communication Khan, A.S. Yasir, Javed Johari, Abdullah Nazim, J.M. Khan, N. QA75 Electronic computers. Computer science 5G is a promising technology that will support high connectivity and device to device communication. It also promises to improve the existing technologies and will support them. Existing LTE-A utilize centralized communication scheme where all the authentication mechanisms need to go through the base station. This centralized authentication mechanism may generate authentication and key management overhead as well as computational complexity, thus not in line with the 5G requirements. On the other hand, distributed communication scheme lacks hop by hop authentication, thus, it is challenging to share the initial security credentials within the relay stations at multi-hop. Secondly, distributed communication scheme required decode and forward relays, a partial intelligent relays that can act as a semi base stations. Such relays are known as non-transparent relays. However, inclusion of such intelligent relays can leads towards a ROGUE RELAY STATION (RRS) attacks, which consequently generate Replay attacks, DoS and the MITM (where mutual authentication is absent). RRS can generate interleaving attack even in the presence of mutual authentication. IJCSNS 2017 Article PeerReviewed text en http://ir.unimas.my/id/eprint/17236/1/Security%20issues%20in%205G%20device%20to%20device%20communication%20%28abstract%29.pdf Khan, A.S. and Yasir, Javed and Johari, Abdullah and Nazim, J.M. and Khan, N. (2017) Security issues in 5G device to device communication. International Journal of Computer Science and Network Security, 17 (5). ISSN 1738-7906 https://www.researchgate.net/publication/317822249
institution Universiti Malaysia Sarawak
building Centre for Academic Information Services (CAIS)
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Sarawak
content_source UNIMAS Institutional Repository
url_provider http://ir.unimas.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Khan, A.S.
Yasir, Javed
Johari, Abdullah
Nazim, J.M.
Khan, N.
Security issues in 5G device to device communication
description 5G is a promising technology that will support high connectivity and device to device communication. It also promises to improve the existing technologies and will support them. Existing LTE-A utilize centralized communication scheme where all the authentication mechanisms need to go through the base station. This centralized authentication mechanism may generate authentication and key management overhead as well as computational complexity, thus not in line with the 5G requirements. On the other hand, distributed communication scheme lacks hop by hop authentication, thus, it is challenging to share the initial security credentials within the relay stations at multi-hop. Secondly, distributed communication scheme required decode and forward relays, a partial intelligent relays that can act as a semi base stations. Such relays are known as non-transparent relays. However, inclusion of such intelligent relays can leads towards a ROGUE RELAY STATION (RRS) attacks, which consequently generate Replay attacks, DoS and the MITM (where mutual authentication is absent). RRS can generate interleaving attack even in the presence of mutual authentication.
format Article
author Khan, A.S.
Yasir, Javed
Johari, Abdullah
Nazim, J.M.
Khan, N.
author_facet Khan, A.S.
Yasir, Javed
Johari, Abdullah
Nazim, J.M.
Khan, N.
author_sort Khan, A.S.
title Security issues in 5G device to device communication
title_short Security issues in 5G device to device communication
title_full Security issues in 5G device to device communication
title_fullStr Security issues in 5G device to device communication
title_full_unstemmed Security issues in 5G device to device communication
title_sort security issues in 5g device to device communication
publisher IJCSNS
publishDate 2017
url http://ir.unimas.my/id/eprint/17236/1/Security%20issues%20in%205G%20device%20to%20device%20communication%20%28abstract%29.pdf
http://ir.unimas.my/id/eprint/17236/
https://www.researchgate.net/publication/317822249
_version_ 1787586510606827520