Font Size: a A A

Security Authentication And Key Agreement Protocol Designed For D2D Communication

Posted on:2020-08-06Degree:MasterType:Thesis
Country:ChinaCandidate:X LiuFull Text:PDF
GTID:2428330602950222Subject:Engineering
Abstract/Summary:PDF Full Text Request
Device-to-Device(D2D)communication allows end-to-end short-distance communication between users under the control of the base station.Because of the direct communication between two users,the data transmitted by the user does not need to transit the base station.D2 D communication can effectively save spectrum resources,reduce communication delay,improve the capacity of communication system and reduce the burden of base station.It plays a vital role in the next generation mobile communication network and wireless system.In addition,the D2 D communication mode has better application value on the offline carrying of electronic bills,offline diagnosis of electronic medicine,face-to-face transaction of electronic commerce and so on.However,the openness of wireless channel and the lack of security infrastructure make D2 D suffer from privacy security threats.User identity authentication and communication key agreement are the basis of establishing secure communication channels between D2 D devices.However,most of the existing research focuses on attack detection or privacy protection in D2 D communication,ignoring the security of data itself.In view of this,in order to solve the security problems such as eavesdropping and tampering in the data transmission process of D2 D communication,we proposed an efficient data transmission scheme based on encryption technology,combining with the characteristics of D2 D communication system.The research contents are as follows:(1)An authentication and key agreement protocol for D2 D communication in cellular networks is proposed.Firstly,this thesis analyses the characteristics of D2 D communication in cellular network,summarizes the security requirements of key agreement and identity authentication process,and proposes an attacker model for D2 D communication.Then,based on Diffie-Hellman(DH)key exchange,an identity authentication and key agreement protocol without the participation of base station is designed,which combines the unidirectional and anti-collision characteristics of hash functions.The scheme enables the base station to verify the key's validity without being aware of the real key.The key verification mechanism can effectively resist man-in-the-middle attack and replay attack.(2)A secure electronic voucher transfer method based on D2 D is proposed.Firstly,the characteristics and requirements of electronic credentials system are analyzed.Then,based on DH key exchange and digital certificate system,a secure transfer method of electronic credentials based on D2 D is designed,which does not require the server to participate in the data transmission of voucher.The digital signature based on public key ensures the integrity of data and the authentication of users.The performance analysis shows that this method can reduce the transmission pressure of the server,save the communication resources of the server,and has low computing and communication overhead.(3)The formal analyses method based on BAN logic and Scyther tool are used to prove the security of the above-mentioned authentication and key agreement protocol and electronic vouchers security transfer method.The performance of the authentication and key agreement protocol for D2 D communication proposed in this thesis is tested by using NS3 simulation test framework.The simulation results show that the proposed scheme can effectively reduce the computational overhead of D2 D communication in the stage of identity authentication and key agreement,and can be applied in cellular network systems.
Keywords/Search Tags:Device to Device communication, key negotiation, encryption technology, electronic voucher transfer
PDF Full Text Request
Related items