Security objectives based key management algorithm for device-to-device applications
International Journal of Development Research
Security objectives based key management algorithm for device-to-device applications
Received 19th May, 2017; Received in revised form 25th June, 2017; Accepted 20th July, 2017; Published online 30th August, 2017
Copyright ©2017, Feras Masoud et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
D2D communications is the promising technology that is essential in the next generation of the mobile network. One of the basic restrictions of deploying this technique is the lack of security objectives which depends on user entities reliability and network capabilities; this issue imposes more expensive choices adopted by the network especially when user entities are out of coverage. Our work concentrated on designing the transmissions between the network and the out of coverage user entities to achieve a set of desired security requirements based on network policy applied by the SDN. The Key materials of MIKEY-SAKKE protocol are used to exchange the shared secure key, along with elliptic curve based Tate-Lichtenbaum pairing are used to achieve the security requirements. A bundle of security objectives is achieved represented by fundamental security objectives such as confidentiality, integrity and availability. The other security objectives such as the source/receiver non-repudiation, the avoidance of free riding attack and the privacy are also achieved