JJEM: Volume 6 Issue 1 (Jan - Jun 2022)
JJEM: Volume 6 Issue 1 (Jan - Jun 2022)
2022-07-31
Review report on Security Challenges in D2D Communication
Ajith Kumar V, K Satyanarayan Reddy
D2D communication opens up a plethora of possibilities. In recent past there is a humongous growth in terms of mobile user subscription base. More and more applications are being ported over Internet, which can be accessed via mobile phones. D2D communication helps service provider by offloading traffic which otherwise use backbone network. D2D communication in 5G facilitates communication among heterogeneous devices, which might be constrained in terms of power and processing capabilities. This heterogenous connection presents challenge for securing D2D communication. Lightweight cryptography can be one of the options for security D2D communication. Lightweight cryptographic techniques help resource constrained devices to run cryptographic algorithms without compromising security requirements. In this way, secure D2D communication necessitates the use of lightweight cryptography.
Availability; Attack models; Communication Protocols; Confidentiality; Constrained devices; Denial of Service; Device to Device Communication; Integrity; Internet of Things; Lightweight Cryptography; User Equipment