Security issues in 5G device to device communication
5G is a promising technology that will support high connectivity and device to device communication. It also promises to improve the existing technologies and will support them. Existing LTE-A utilize centralized communication scheme where all the authentication mechanisms need to go through the bas...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IJCSNS
2017
|
Subjects: | |
Online Access: | http://ir.unimas.my/id/eprint/17236/1/Security%20issues%20in%205G%20device%20to%20device%20communication%20%28abstract%29.pdf http://ir.unimas.my/id/eprint/17236/ https://www.researchgate.net/publication/317822249 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Malaysia Sarawak |
Language: | English |
id |
my.unimas.ir.17236 |
---|---|
record_format |
eprints |
spelling |
my.unimas.ir.172362024-01-09T03:47:08Z http://ir.unimas.my/id/eprint/17236/ Security issues in 5G device to device communication Khan, A.S. Yasir, Javed Johari, Abdullah Nazim, J.M. Khan, N. QA75 Electronic computers. Computer science 5G is a promising technology that will support high connectivity and device to device communication. It also promises to improve the existing technologies and will support them. Existing LTE-A utilize centralized communication scheme where all the authentication mechanisms need to go through the base station. This centralized authentication mechanism may generate authentication and key management overhead as well as computational complexity, thus not in line with the 5G requirements. On the other hand, distributed communication scheme lacks hop by hop authentication, thus, it is challenging to share the initial security credentials within the relay stations at multi-hop. Secondly, distributed communication scheme required decode and forward relays, a partial intelligent relays that can act as a semi base stations. Such relays are known as non-transparent relays. However, inclusion of such intelligent relays can leads towards a ROGUE RELAY STATION (RRS) attacks, which consequently generate Replay attacks, DoS and the MITM (where mutual authentication is absent). RRS can generate interleaving attack even in the presence of mutual authentication. IJCSNS 2017 Article PeerReviewed text en http://ir.unimas.my/id/eprint/17236/1/Security%20issues%20in%205G%20device%20to%20device%20communication%20%28abstract%29.pdf Khan, A.S. and Yasir, Javed and Johari, Abdullah and Nazim, J.M. and Khan, N. (2017) Security issues in 5G device to device communication. International Journal of Computer Science and Network Security, 17 (5). ISSN 1738-7906 https://www.researchgate.net/publication/317822249 |
institution |
Universiti Malaysia Sarawak |
building |
Centre for Academic Information Services (CAIS) |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Sarawak |
content_source |
UNIMAS Institutional Repository |
url_provider |
http://ir.unimas.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Khan, A.S. Yasir, Javed Johari, Abdullah Nazim, J.M. Khan, N. Security issues in 5G device to device communication |
description |
5G is a promising technology that will support high connectivity and device to device communication. It also promises to improve the existing technologies and will support them. Existing LTE-A utilize centralized communication scheme where all the authentication mechanisms need to go through the base station. This centralized authentication mechanism may generate authentication and key management overhead as well as computational complexity, thus not in line with the 5G requirements. On the other hand, distributed communication scheme lacks hop by hop authentication, thus, it is challenging to share the initial security credentials within the relay stations at multi-hop.
Secondly, distributed communication scheme required decode and forward relays, a partial intelligent relays that can act as a semi base stations. Such relays are known as non-transparent relays. However, inclusion of such intelligent relays can leads towards a ROGUE RELAY STATION (RRS) attacks, which consequently generate Replay attacks, DoS and the MITM (where mutual authentication is absent). RRS can generate interleaving attack even in the presence of mutual authentication. |
format |
Article |
author |
Khan, A.S. Yasir, Javed Johari, Abdullah Nazim, J.M. Khan, N. |
author_facet |
Khan, A.S. Yasir, Javed Johari, Abdullah Nazim, J.M. Khan, N. |
author_sort |
Khan, A.S. |
title |
Security issues in 5G device to device communication |
title_short |
Security issues in 5G device to device communication |
title_full |
Security issues in 5G device to device communication |
title_fullStr |
Security issues in 5G device to device communication |
title_full_unstemmed |
Security issues in 5G device to device communication |
title_sort |
security issues in 5g device to device communication |
publisher |
IJCSNS |
publishDate |
2017 |
url |
http://ir.unimas.my/id/eprint/17236/1/Security%20issues%20in%205G%20device%20to%20device%20communication%20%28abstract%29.pdf http://ir.unimas.my/id/eprint/17236/ https://www.researchgate.net/publication/317822249 |
_version_ |
1787586510606827520 |