Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication

Yasir, Javed (2020) Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication. PhD thesis, Universiti Malaysia Sarawak (UNIMAS).

[img] PDF (Please get the password from ACADEMIC REPOSITORY UNIT, ext: 082-583932/ 082-583914)
Trust based Lightweight Security Protocol for Device to Device Multihop.pdf
Restricted to Registered users only

Download (1MB) | Request a copy


Device to Device (D2D) communication has gained a lot of popularity in recent years as it offers high speed, extended coverage, and ubiquitous connectivity. It is one of the key approaches that has revolutionized communication and is the basis of the 5G network. D2D allows small devices such as mobile phones, tablets to act as Non-transparent relays (NTR) where they can provide services as well as forward traffic, request or services besides basic function that is direct communication without the need of Base Station (BS). This concept of multihop D2D communication has introduced a number of issues that were non-prevalent in current cellular communication. The major issue is security that is allowing D2D communication in a secure and trustworthy manner. Another issue, that is challenging is that current proven used security approaches cannot be adapted as devices that require security have limited computation and space as well as they are constrained by power and bandwidth issues. NTR arise another issue that is trust, that means how these devices can be trusted as well as how the identity of users can be protected. In order to handle these issues, a trustworthy lightweight security scheme that allows multihop secure communication is designed that is called as Trust Based Lightweight Security Protocol in multihop D2D communication (TLwS). Formal and computational analysis of TLwS shows that it can mitigate replay attack, Man-in-the-Middle (MITM) attack, freshness attack, interleaving attack, and masquerading attack. It also achieves confidentiality, integrity and avoids any no-repudiation attack. The computational overhead shows that TLwS is at least 40% better than popular algorithm such as SeDS, UAKA-D2D, and D2D-Assist. Discrete logarithm analysis shows that TLwS is secure against the current security algorithms as well as quantum attacks. TLwS offers flexibility that allows it to be used in any kind of security environment. Processing time for TLwS is at least 50% better than benchmarking schemes. TLwS can be used easily in 5G communication where it will allow multihop D2D secure communication.

Item Type: Thesis (PhD)
Additional Information: Thesis (PhD.) - Universiti Malaysia Sarawak , 2020.
Uncontrolled Keywords: D2D security, multihop D2D security, trust-based security, light-weight security, ECC, unimas, university, universiti, Borneo, Malaysia, Sarawak, Kuching, Samarahan, ipta, education, Postgraduate, research, Universiti Malaysia Sarawak.
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Academic Faculties, Institutes and Centres > Faculty of Computer Science and Information Technology
Depositing User: YASIR JAVED
Date Deposited: 27 Feb 2020 06:10
Last Modified: 14 May 2020 03:56

Actions (For repository members only: login required)

View Item View Item