Font Size: a A A

Research On Secure Data Sharing Mechanism For D2D Communication In 5G Network

Posted on:2022-05-30Degree:MasterType:Thesis
Country:ChinaCandidate:X B ChengFull Text:PDF
GTID:2518306740994349Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
As one of the most promising communication technologies in 5G networks,D2 D communication provides users with direct device-to-device communication and improved spectrum utilization,reduced communication delays,and improved user experience.However,due to the openness of the communication link,D2 D communication faces serious security issues: 1)The confidentiality and integrity of user information cannot be guaranteed,and illegal users can steal and destroy confidential information.2)Secure identity authentication cannot be guaranteed,and illegal users can carry out forgery attacks.These problems seriously hinder the further development of D2 D communication.Aiming at these security problems in current D2 D communication,we proposed security protocol mechanism suitable for D2 D communication based on the research and analysis of related theories and protocols.At the same time,based on the discrete logarithm and the Diffie-Hellman problem,we formally proved that the protocol mechanism can guarantee the confidentiality and integrity of the data,and realize the secure identity authentication.The main contributions of this thesis are as follows.Firstly,we analyzed the existing D2 D group communication identity authentication and key agreement protocol(DG-ESSBA),and concluded that the protocol had key escrow problem and could not guarantee the forward and backward security of the group.In the DG-ESSBA protocol,the shared key was generated by the core network,which led to key escrow problem.Once the core network was attacked,user data was easily leaked.At the same time,in the dynamic group management process,when new users join the system,the new users can extract the shared key of the original group through the forward security attack algorithm,thereby decrypting the user data of the original group,so that the forward security of the group cannot be guaranteed.When users are revoked,the revoked users can extract the shared key of the new group through the backward security attack algorithm,thereby decrypting the user data of the new group,so that the group's backward security cannot be guaranteed.Secondly,we proposed an identity authentication and key agreement protocol suitable for D2 D group communication(DG-AKA),which implemented secure identity authentication and key agreement as well as group forward and backward security and solved the key escrow problem.The DG-AKA protocol guaranteed secure identity authentication based on the computational Diffie-Hellman(CDH)problem,and made it impossible for illegal users to forge signatures.Based on the modified decisional bilinear Diffie-Hellman(MDBDH)problem,we designed the secure authentication process to realize secure key aggrement so that it is impossible for illegal users and the core network to obtain a shared key.In this way,we solved the key escrow problem.Combining the authentication and key agreement process,in DG-AKA scheme,we achieved secure dynamic group member management and ensured group forward and backward security.When group members are revoked or new members join the system,without re-executing all the protocols,the session key can be updated safely.Finally,we proposed a secure data sharing protocol suitable for D2 D multi-hop communication(MDS-CLGSC).The protocol was based on a certificateless signcryption algorithm which ensured the confidentiality and integrity of data,as well as identity authentication between transmission nodes,and realized unlinkability and context privacy protection.The MDS-CLGSC protocol implemented data confidentiality protection based on the CDH problem so that illegal users could not decrypt data.Based on the discrete logarithm problem(DLP),the protocol guaranteed secure identity authentication so that illegal users could not forge signatures.Combining confidentiality and security authentication,data integrity verification,linkability and context privacy protection were realized.
Keywords/Search Tags:D2D communication, Confidentiality, Key agreement, Identity authentication, Certificateless signcryption, 5G network
PDF Full Text Request
Related items