Welcome to JJEM: A Multi-Disicplinary Journal of JNNCE, Shimoga

JJEM Eleventh Issue - Volume 6 Number 1 -2022

Volume 6, Issue 1


Securing D2D Communication using Lightweight Cryptography


Published:    2022-07-31


Authors


Ajith Kumar V,  K Satyanarayan Reddy


Abstract


D2D communication is going to be a path breaking technology. D2D communication can help in many scenarios including Emergency Service. The D2D communication is having a lot of potential to serve community either through emergency services and commercial or paid services. Security and privacy are two important issues in D2D communication. The Objective of this paper is to explore security challenges in D2D communication and suggest remediation with lightweight cryptography. Evaluation of wireless network leads to massive load on the service provider network. The D2D communication can be the choice for offloading the traffic from the service provider network. Security should not become overhead, lightweight cryptography techniques can be explored to support resource constrained devices. Enough care is to be taken for not compromising security and by using lightweight cryptographic techniques. As we know some attacks such as Denial of Service (DoS) cannot be completely prevented but can be mitigated. In this paper we compared existing work on providing security for D2D communication. There is no single solution which can address security for various D2D communication scenarios such as full coverage, partial coverage, and no coverage. This gives a clear indication that a set of security solutions is required to address different D2D scenarios, each D2D scenario come with its own challenges. In this work we are proposing encryption mechanism using lightweight cryptographic approach. Proposed encryption mechanism is targeted for low-end resource constrained devices. Although Bluetooth and Wi-Fi technology provides minimum security, our scheme can be used to provide additional security for data transmission. We extend our work by breaking different D2D scenarios and proposing appropriate solution for each scenario.


Keywords


D2D communication security; Lightweight cryptography; Resource constrained devices