Journal

JJEM: Volume 6 Issue 1 (Jan - Jun 2022)

Published On:

2022-07-31

Topic

Review report on Security Challenges in D2D Communication

Authors

Ajith Kumar V, K Satyanarayan Reddy

Abstract

D2D communication opens up a plethora of possibilities. In recent past there is a humongous growth in terms of mobile user subscription base. More and more applications are being ported over Internet, which can be accessed via mobile phones. D2D communication helps service provider by offloading traffic which otherwise use backbone network. D2D communication in 5G facilitates communication among heterogeneous devices, which might be constrained in terms of power and processing capabilities. This heterogenous connection presents challenge for securing D2D communication. Lightweight cryptography can be one of the options for security D2D communication. Lightweight cryptographic techniques help resource constrained devices to run cryptographic algorithms without compromising security requirements. In this way, secure D2D communication necessitates the use of lightweight cryptography.

Keywords

Availability; Attack models; Communication Protocols; Confidentiality; Constrained devices; Denial of Service; Device to Device Communication; Integrity; Internet of Things; Lightweight Cryptography; User Equipment