Font Size: a A A

Authentication And Key Agreement Protocol For D2D Communication

Posted on:2015-12-16Degree:MasterType:Thesis
Country:ChinaCandidate:H Q LvFull Text:PDF
GTID:2308330464470138Subject:Information security
Abstract/Summary:PDF Full Text Request
With the rapid development of mobile communication, as a new wireless communication mode under the LTE, Device to Device (DID) communication has got much attention from the operators and researchers. Because of the advantages of spectral efficiency increased in the cellular system, the load of cell base station reduced, the transmission power of the terminal and the base station reduced and system performance enhanced, D2D communication has great prospects. Although the study of D2D communication is ongoing, the research is not enough in the safety aspects. To ensure the confidentiality and integrity of D2D communication, the user equipments should be authenticated each other and need a session key agreement. To solve the problem, some scholars have studied from the physical layer security, but it is more applicable to no network infrastructure of environment and has the problems of unable authentication communication entity identity and computational complexity.This paper studied the authentication and key agreement schemes for D2D communication under the cell network from the application layer in depth. Based on the process of D2D communication, we gave the relevant schemes at the one-to-one communication and one-to-many communication scenarios.The main research results obtained are as follows:1. A key agreement scheme for D2D one-to-one communication has been studied. In this paper combining with the actual process of D2D one-to-one communication, we propose an authentication and key agreement scheme. During the period of the user equipment registration, user equipment and the proximity service function module firstly begin a GBA process by the 3 GPP Generic Authentication Architecture (GAA) to generate a GAA master session key, and then use the master session key to complete the D2D applications registration, device discovery and key agreement. Analysis shows that the scheme using the GAA completed the authentication and key agreement between the two user equipments for D2D one-to-one communicition. In the aspect of security,it can ensure the confidentiality,integrity and anti-replay attack, thus ensure the security of communication between the two parties. In the aspect of performance, compared with no use of secure communications processes D2D communication, the calculation and communication traffic increase, but the scheme still has good availability.2. A key agreement scheme for D2D one-to-many communication has been studied. In the media service of D2D one-to-many communication, in order to secure business data streams, the initiating user equipment and other multiple user equipments need to share a session key. This paper proposes a key agreement scheme for D2D one-to-many communication.In this scheme the proximity service function module and each user equipments generate a pre-shared key by Generic Authentication Architecture(GAA), and the proximity service function module send necessary information needed to calculate the group master key to each equipment by broadcasting. With the above information D2D communication equipments can independently calculate the required group master key for secure media service, and the initiating equipment then generates a session key for the group one-to-many sessions and broadcast the session key encrypted by the group master key to other equipments. Analysis shows that the scheme satisfies security properties such as prior security,backward security and collusion resistance, and compared with the existing security architecture for media security of one-to-many group communication, the key agreement scheme has a fewer message exchange rounds.
Keywords/Search Tags:Device to Device(D2D), device discovery, authentication and key agreement, generic authentication architecture (GAA)
PDF Full Text Request
Related items