DSpace logo

Please use this identifier to cite or link to this item: http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16056
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDua, Amit-
dc.date.accessioned2024-10-08T12:54:50Z-
dc.date.available2024-10-08T12:54:50Z-
dc.date.issued2021-
dc.identifier.urihttps://ieeexplore.ieee.org/abstract/document/9473557-
dc.identifier.urihttp://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16056-
dc.description.abstractThe secure message exchange is instrumental in the success of device-to-device communication. Any malicious activity has the potential to compromise the confidentiality or integrity of the messages exchanged between different user equipment. To address the aforementioned issue, this study proposes a novel elliptic curve cryptography based key-exchange protocol for authentication of two user equipment in network-assisted D2D communication. The proposed protocol is based on standard elliptic curve Diffie-Hellman key exchange and hash-based message authentication code. Subsequently, elaborate threat analysis of the proposed protocol against several adversarial attacks is presented to prove its resilience. The observed low computational time and communication overhead associated with this protocol and its resilience against known attacks advance its strong candidature for implementation of D2D communication in 5G cellular networks.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.subjectComputer Scienceen_US
dc.subjectElliptic curve cryptographyen_US
dc.subjectDevice-to-device communicationen_US
dc.subjectNetwork securityen_US
dc.titleA Secure Scalable Authentication Protocol for Access Network Communications using ECCen_US
dc.typeArticleen_US
Appears in Collections:Department of Computer Science and Information Systems

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.