Formal verification of authentication and service authorization protocols in 5G-enabled device-to-device communications using ProVerif
Edris, Ed Kamya Kiyemba ORCID: https://orcid.org/0000-0001-5981-9844, Aiash, Mahdi
ORCID: https://orcid.org/0000-0002-3984-6244 and Loo, Jonathan
ORCID: https://orcid.org/0000-0002-2197-8126
(2021)
Formal verification of authentication and service authorization protocols in 5G-enabled device-to-device communications using ProVerif.
Electronics, 10
(13)
, e1608.
ISSN 2079-9292
[Article]
(doi:10.3390/electronics10131608)
![]() |
PDF
- Published version (with publisher's formatting)
Available under License Creative Commons Attribution 4.0. Download (985kB) |
Abstract
Device-to-Device (D2D) communications will be used as an underlay technology in the Fifth Generation mobile network (5G), which will make network services of multiple Service Providers (SP) available anywhere. The end users will be allowed to access and share services using their User Equipments (UEs), and thus they will require seamless and secured connectivity. At the same time, Mobile Network Operators (MNOs) will use the UE to offload traffic and push contents closer to users relying on D2D communications network. This raises security concerns at different levels of the system architecture and highlights the need for robust authentication and authorization mechanisms to provide secure services access and sharing between D2D users. Therefore, this paper proposes a D2D level security solution that comprises two security protocols, namely, the D2D Service security (DDSec) and the D2D Attributes and Capability security (DDACap) protocols, to provide security for access, caching and sharing data in network-assisted and non-network-assisted D2D communications scenarios. The proposed solution applies Identity-based Encryption (IBE), Elliptic Curve Integrated Encryption Scheme (ECIES) and access control mechanisms for authentication and authorization procedures. We formally verified the proposed protocols using ProVerif and applied pi calculus. We also conducted a security analysis of the proposed protocols.
Item Type: | Article |
---|---|
Additional Information: | This article belongs to the Special Issue 5G and beyond Mobile and Satellite Communications |
Keywords (uncontrolled): | 5G, D2D, security protocol, authentication, authorization, formal methods, ProVerif |
Research Areas: | A. > School of Science and Technology > Computer Science |
Item ID: | 33488 |
Notes on copyright: | Copyright: © 2020 by the authors. Licensee MDPI, Basel, Switzerland.
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/) |
Useful Links: | |
Depositing User: | Jisc Publications Router |
Date Deposited: | 07 Jul 2021 14:45 |
Last Modified: | 07 Jul 2021 14:45 |
URI: | https://eprints.mdx.ac.uk/id/eprint/33488 |
Actions (login required)
![]() |
View Item |
Statistics
Additional statistics are available via IRStats2.