Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network
Device to Device (D2D) communication is a type of technology where two devices can communicate directly with each other without the need to contact Base Station or any central infrastructure. With emerging of Long Term Evaluation (LTE) and Fifth Generation (5G) technology, D2D has gained a lot of at...
Saved in:
Main Authors: | , |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2022
|
Subjects: | |
Online Access: | http://ir.unimas.my/id/eprint/39185/1/Rashad.pdf |
Tags: | Add Tag |
id |
my-unimas-ir.39185 |
---|---|
record_format |
uketd_dc |
institution |
Universiti Malaysia Sarawak |
collection |
UNIMAS Institutional Repository |
language |
English |
topic |
QA75 Electronic computers Computer science |
spellingShingle |
QA75 Electronic computers Computer science Rashad Mahmood, Saqib Adnan Shahid, Khan Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network |
description |
Device to Device (D2D) communication is a type of technology where two devices can communicate directly with each other without the need to contact Base Station or any central infrastructure. With emerging of Long Term Evaluation (LTE) and Fifth Generation (5G) technology, D2D has gained a lot of attention for communication between closely located mobile devices for offering high speed, energy efficiency, throughput, less delay, and efficient spectrum usage. D2D has changed recent wireless networks with new trends as D2D can play a vital role in sharing resources by load off the network in local areas by direct communication between devices and useful in natural disasters where BS is destroyed. D2D has revolutionized the direct communication as it is a basis for 5G network. D2D allows miniature devices like cell phone, tablets and radio devices to work as Non-Transparent Relays (NTR) where they can provide services as well as forward traffic, request services by direct communication without the need of Base Station (BS) or central network infrastructure. Multi-hop D2D can be used for peer-to-peer communication or even access to cellular networks. This concept of multihop D2D communication has introduced a number of issues and challenges that were not prevalent in traditional current cellular communication. One of the major issues in D2D is security that is required in D2D communication to transmit information securely over non secure channel. The major challenge when considering security is that current established security techniques cannot be modified as security-requiring devices are miniature with restricted processing and storage or are constrained by power and bandwidth issues. Another issue is that how devices can get secure mutual authentication for secure communication. To tackle these issues, a lightweight multifactor authentication scheme that allows multihop secure communication over open channel is designed called as Lightweight ECC based Multifactor Authentication Protocol (LEMAP) in multihop D2D communication. Formal analysis of scheme is performed using well known BAN Logic method which is used to check correctness of protocol. The formal analysis of LEMAP proves that it can mitigate replay attack, Man-in-the-Middle (MITM) attack, Rogue device attack, Denial of Service (DoS) attack, timestamp exploitation attack, impersonation attack and masquerading attack. LEMAP also achieves security requirements confidentiality, integrity, privacy, non-repudiation, secure mutual authentication and anonymity. The communication cost and computational overhead of benchmark protocols and the proposed scheme LEMAP are also calculated. The results show that LEMAP is 6%-28% percent stronger than the selected benchmark algorithms such as 2PAKEP, Chaotic based authentication and TwoFactor authentication protocol. Additionally, LEMAP provides additional security by using trust validation, double hashing, and reduced authentication overhead. Discrete logarithm analysis shows that LEMAP is more secure compared to current security algorithms or current security algos are used as attacks against LEMAP. LEMAP is a lightweight and flexible scheme which can be used in 5G as well as multihop D2D communication to provide secure communication environment.
Keywords: D2D security, multihop D2D security, multi factor, light-weight security, ECC |
format |
Thesis |
qualification_name |
Doctor of Philosophy (PhD.) |
qualification_level |
Doctorate |
author |
Rashad Mahmood, Saqib Adnan Shahid, Khan |
author_facet |
Rashad Mahmood, Saqib Adnan Shahid, Khan |
author_sort |
Rashad Mahmood, Saqib |
title |
Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network |
title_short |
Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network |
title_full |
Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network |
title_fullStr |
Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network |
title_full_unstemmed |
Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network |
title_sort |
lightweight ecc based multifactor authentication protocol (lemap) for device to device cellular network |
granting_institution |
Unimas |
granting_department |
Network for Computing |
publishDate |
2022 |
url |
http://ir.unimas.my/id/eprint/39185/1/Rashad.pdf |
_version_ |
1783728508962340864 |
spelling |
my-unimas-ir.391852023-06-27T06:59:25Z Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network 2022-08-11 Rashad Mahmood, Saqib Adnan Shahid, Khan QA75 Electronic computers. Computer science Device to Device (D2D) communication is a type of technology where two devices can communicate directly with each other without the need to contact Base Station or any central infrastructure. With emerging of Long Term Evaluation (LTE) and Fifth Generation (5G) technology, D2D has gained a lot of attention for communication between closely located mobile devices for offering high speed, energy efficiency, throughput, less delay, and efficient spectrum usage. D2D has changed recent wireless networks with new trends as D2D can play a vital role in sharing resources by load off the network in local areas by direct communication between devices and useful in natural disasters where BS is destroyed. D2D has revolutionized the direct communication as it is a basis for 5G network. D2D allows miniature devices like cell phone, tablets and radio devices to work as Non-Transparent Relays (NTR) where they can provide services as well as forward traffic, request services by direct communication without the need of Base Station (BS) or central network infrastructure. Multi-hop D2D can be used for peer-to-peer communication or even access to cellular networks. This concept of multihop D2D communication has introduced a number of issues and challenges that were not prevalent in traditional current cellular communication. One of the major issues in D2D is security that is required in D2D communication to transmit information securely over non secure channel. The major challenge when considering security is that current established security techniques cannot be modified as security-requiring devices are miniature with restricted processing and storage or are constrained by power and bandwidth issues. Another issue is that how devices can get secure mutual authentication for secure communication. To tackle these issues, a lightweight multifactor authentication scheme that allows multihop secure communication over open channel is designed called as Lightweight ECC based Multifactor Authentication Protocol (LEMAP) in multihop D2D communication. Formal analysis of scheme is performed using well known BAN Logic method which is used to check correctness of protocol. The formal analysis of LEMAP proves that it can mitigate replay attack, Man-in-the-Middle (MITM) attack, Rogue device attack, Denial of Service (DoS) attack, timestamp exploitation attack, impersonation attack and masquerading attack. LEMAP also achieves security requirements confidentiality, integrity, privacy, non-repudiation, secure mutual authentication and anonymity. The communication cost and computational overhead of benchmark protocols and the proposed scheme LEMAP are also calculated. The results show that LEMAP is 6%-28% percent stronger than the selected benchmark algorithms such as 2PAKEP, Chaotic based authentication and TwoFactor authentication protocol. Additionally, LEMAP provides additional security by using trust validation, double hashing, and reduced authentication overhead. Discrete logarithm analysis shows that LEMAP is more secure compared to current security algorithms or current security algos are used as attacks against LEMAP. LEMAP is a lightweight and flexible scheme which can be used in 5G as well as multihop D2D communication to provide secure communication environment. Keywords: D2D security, multihop D2D security, multi factor, light-weight security, ECC Unimas 2022-08 Thesis http://ir.unimas.my/id/eprint/39185/ http://ir.unimas.my/id/eprint/39185/1/Rashad.pdf text en validuser phd doctoral Unimas Network for Computing Abbasi, I. A., et al. (2018). Dynamic multiple junction selection based routing protocol for VANETs in city environment. Applied Sciences 8(5), 687. Abbasi, I. A., et al. (2018). A reliable path selection and packet forwarding routing protocol for vehicular ad hoc networks. EURASIP Journal on Wireless Communications and Networking, 2018(1), 1-19. Abbasi, I. A. and A. Shahid Khan (2018). A review of vehicle to vehicle communication protocols for VANETs in the urban environment. future internet, 10(2), 14. Abd-Elrahman, E., Ibn-Khedher, H., Afifi, H., & Toukabri, T. (2015). Fast group discovery and non-repudiation in D2D communications using IBE. In 2015 International Wireless Communications and Mobile Computing Conference, (pp. 616–621). Adam, N., Tapparello, C., & Heinzelman, W. (2019). Infrastructure vs. Multi-Hop D2D Networks: Availability and Performance Analysis. In 2019 International Conference on Computing, Networking and Communications, (pp. 735–740). Aggarwal, D., Joux, A., Prakash, A., & Santha, M. (2018). A new public-key cryptosystem via Mersenne numbers. In Annual International Cryptology Conference, (pp. 459–482). Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M., & Gurtov, A. (2017). 5G security: Analysis of threats and solutions. In 2017 IEEE Conference on Standards for Communications and Networking (CSCN), (pp. 193–199). Ahmad, Z., et al. (2021). Anomaly Detection Using Deep Neural Network for IoT Architecture. Applied Sciences, 11(15), 7050. Ahmad, Z., et al. (2021). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1), e4150. Andreev, S., Galinina, O., Pyattaev, A., Johnsson, K., & Koucheryavy, Y. (2014). Analyzing assisted offloading of cellular user sessions onto D2D links in unlicensed bands. IEEE Journal on Selected Areas in Communications, 33(1), 67–80. Aqeel, S., et al. (2021). A comprehensive study on DNA based Security scheme Using Deep Learning in Healthcare. EDPACS, 1-17. Asadi, A., Wang, Q., & Mancuso, V. (2014). A survey on device-to-device communication in cellular networks. IEEE Communications Surveys & Tutorials, 16(4), 1801-1819. Astely, D., Dahlman, E., Fodor, G., Parkvall, S., & Sachs, J. (2013). LTE release 12 and beyond. IEEE Communications Magazine, 51(7), 154–160. Baccelli, F., Khude, N., Laroia, R., Li, J., Richardson, T., Shakkottai, S., & Wu, X. (2012). On the design of device-to-device autonomous discovery. In 2012 Fourth international conference on communication systems and networks, (pp. 1–9). Bach, E., & Sandlund, B. (2018). Baby-step giant-step algorithms for the symmetric group. Journal of Symbolic Computation, 85, 55–71. Balan, K., et al. (2018). "RSSI and Public Key Infrastructure based Secure Communication in Autonomous Vehicular Networks." Inter. J. Adv. Comput. Sci. Appl, 9, 298-304. Bastiaan, M. (2015). Preventing the 51%-Attack: a Stochastic Analysis of Two Phase Proof of Work in Bitcoin. In 2015 Proceedings of the 22nd Twente Student Conference on IT, (pp 1–10). Borgohain, T., Kumar, U., & Sanyal, S. (2015). Survey of security and privacy issues of internet of things. arXiv preprint arXiv:1501.02211. Bos, J., Kaihara, M., Kleinjung, T., Lenstra, A. K., & Montgomery, P. L. (2009). On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography. Chang, C. C., & Liao, W. Y. (1994). A remote password authentication scheme based upon ElGamal's signature scheme. Computers & Security, 13(2), 137–144. Chan, K. Y., et al. (2019). A framework for traceable and transparent supply chain management for agri-food sector in malaysia using blockchain technology. Int. J. Adv. Comput. Sci. Appl, 10(11), 149-156. Chen, S., & Steinberger, J. (2014). Tight security bounds for key-alternating ciphers. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, (pp. 327–350). Cheng, C., Lu, R., Petzoldt, A., & Takagi, T. (2017). Securing the Internet of Things in a quantum world. IEEE Communications Magazine, 55(2), 116–120. Cohen, M., & Dam, M. (2005). A completeness result for BAN logic. In Methods for modalities, 4(1), 1–32. Cote, G., Shirani, S., & Kossentini, F. (2000). Optimal mode selection and synchronization for robust video communications over error-prone networks. IEEE Journal on Selected Areas in Communications, 18(6), 952–965. Dholeshwar, A., & Salapurkar, D. (2016). A Survey on Bio-Inspired Proximity Discovery and Synchronization with Security Solutions for D2D Communications. International Journal of Engineering Research and Technology, 3(3), 970–974. Dildar, M. S., Khan, N., Abdullah, J. B., & Khan, A. S. (2017, March). Effective way to defend the hypervisor attacks in cloud computing. In 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), (pp. 154-159). Doppler, K., Ribeiro, C. B., & Kneckt, J. (2011). Advances in D2D communications: Energy efficient service and device discovery radio. In 2011 2nd international conference on wireless communication, vehicular technology, information theory and aerospace & electronic systems technology, (pp. 1–6). Doppler, K., Yu, C., Ribeiro, C. B. and Janis, P. (2010). Mode selection for device-to-device communication underlaying an LTE-advanced network. In IEEE Wireless Communication and Networking Conference, (pp. 1–6). Droste, H., Zimmermann, G., Stamatelatos, M., Lindqvist, N., Bulakci, O., Eichinger, J., & Tullberg, H. (2015). The METIS 5G architecture: A summary of METIS work on 5G architectures. In 2015 IEEE 81st Vehicular Technology Conference, (pp. 1–5). Fabian, B., Gürses, S., Heisel, M., Santen, T., & Schmidt, H. (2010). A comparison of security requirements engineering methods. Requirements Engineering, 15(1), 7–40. Faria, D. B., & Cheriton, D. R. (2006). Detecting identity-based attacks in wireless networks using signalprints. In Proceedings of the 5th ACM workshop on Wireless security, (pp. 43–52). Fauzi, A. and A. Khan (2017). Threats Advancement in Primary User Emulation Attack and Spectrum Sensing Data Falsification (SSDF) Attack in Cognitive Radio Network (CRN) for 5G Wireless Network Environment. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(2-10), 179-183. Ferrus, R., & Sallent, O. (2014). Extending the LTE\/LTE-A Business Case: Mission-and Business-Critical Mobile Broadband Communications. IEEE Vehicular Technology Magazine, 9(3), 47–55. Fujdiak, R. A. D. E. K., Misurec, J. I. R. I., Mlynek, P. E. T. R., & Janer, L. (2016). Cryptograph key distribution with elliptic curve diffie-hellman algorithm in low-power devices for power grids. Revue Roumaine des Sciences Techniques, 84–88. Gandotra, P., & Jha, R. K. (2016). Device-to-device communication in cellular networks: A survey. Journal of Network and Computer Applications, 71, 99–117. Gandotra, P., Jha, R. K., & Jain, S. (2017). A survey on device-to-device (D2D) communication: Architecture and security issues. Journal of Network and Computer Applications, 78, 9–29. Ghudayyer, M. B., Javed, Y., & Alenezi, M. (2017). A Security Perspective on Adoption and Migration to Mobile Cloud Technology. International Journal on Informatics Visualization, 1(4), 143–149. Gordon, D. (2011). Discrete logarithm problem. Encyclopedia of Cryptography and Security, 1(1), 352–353. Grossglauser, M., & Tse, D. N. (2002). Mobility increases the capacity of ad hoc wireless networks. IEEE/ACM Transactions on Networking, 10(4), 477–486. Gu, J., Bae, S. J., Choi, B. G., & Chung, M. Y. (2011). Dynamic power control mechanism for interference coordination of device-to-device communication in cellular networks. In 2011 Third international conference on ubiquitous and future networks, (pp. 71-75). Gupta, A., & Jha, R. K. (2015). A survey of 5G network: Architecture and emerging technologies. IEEE Access, 3, 1206–1232. Gupta, A., Jha, R. K., & Devi, R. (2018). Security architecture of 5g wireless communication network. International Journal of Sensors Wireless Communications and Control, 8(2), 92–99. Gupta, K., & Silakari, S. (2011). Ecc over rsa for asymmetric encryption: A review. International Journal of Computer Science Issues, 8(3), 370. Habib, B., Cambou, B., Booher, D., & Philabaum, C. (2017). Public key exchange scheme that is addressable (PKA). In 2017 IEEE Conference on Communications and Network Security, (pp. 392–393). Habiba, U., & Hossain, E. (2018). Auction mechanisms for virtualization in 5G cellular networks: Basics, trends, and open challenges. IEEE Communications Surveys & Tutorials, 20(3), 2264–2293. Haddad, Z., Mahmoud, M., Taha, S., & Saroit, I. A. (2015). Secure and privacy-preserving AMI-utility communications via LTE-A networks. In 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications, (pp. 748–755). Hafeez, I., Ding, A. Y., Antikainen, M., & Tarkoma, S. (2017). Toward Secure Edge Networks Taming Device to Device (D2D) Communication in IoT. arXiv preprint arXiv:1712.05958. Hamzah, A. R., et al. (2013). Distributed Multi-Hop Reservation Protocol for Wireless Personal Area Ultra-Wideband Networks. Computers and Software, 1294. Han, M. H., Kim, B. G., & Lee, J. W. (2012). Subchannel and transmission mode scheduling for D2D communication in OFDMA networks. In 2012 IEEE Vehicular Technology Technology Conference, (pp. 1–5). Haus, M., Waqas, M., Ding, A. Y., Li, Y., Tarkoma, S., & Ott, J. (2017). Security and privacy in device-to-device (D2D) communication: A review. IEEE Communications Surveys & Tutorials, 19(2), 1054–1079. He, Y., Ren, J., Yu, G., & Cai, Y. (2019). D2D Communications Meet Mobile Edge Computing for Enhanced Computation Capacity in Cellular Networks. IEEE Transactions on Wireless Communications, 18(3), 1750–1763. Hossain, M. M., & Hasan, R. (2017). Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes. In IEEE congress on Internet of Things, (pp. 1–8). Hsu, R. H., Lee, J., Quek, T. Q., & Chen, J. C. (2017). GRAAD: Group anonymous and accountable D2D communication in mobile networks. IEEE Transactions on Information Forensics and Security, 13(2), 449–464. Hu, L., & Evans, D. (2003, January). Secure aggregation for wireless networks. In 2003 Symposium on Applications and the Internet Workshops proceedings, (pp. 384–391). Huang, J., Liao, Y., Xing, C. C., & Chang, Z. (2019). Multi-Hop D2D Communications With Network Coding: From a Performance Perspective. IEEE Transactions on Vehicular Technology, 68(3), 2270–2282. Husain, S., Prasad, A., Kunz, A., Papageorgiou, A., & Song, J. (2014). Recent trends in standards related to the internet of things and machine-to-machine communications. Journal of information and communication convergence engineering, 12(4), 228–236. Imai, H., Okada, H., Yamazato, T., & Katayama, M. (2006). The effect of multipath hybrid routing protocol in multihop cellular networks. In 2006 IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications (pp. 1–5). Iqbal, A., et al. (2015). Reinforcing the National Innovation System of Malaysia Based on University-Industry Research Collaboration: A System Thinking Approach. International Journal of Management Sciences and Business Research, 4(1), 6-15. Iqbal, A. M., et al. (2010). Innovation Oriented Constraints between University-industry Technological Collaboration. PROCEEDING ICPE-4 2010, 4, 24. Iqbal, A. M., et al. (2013). A novel cost efficient evaluation model for assessing research-based technology transfer between university and industry. Sains Humanika, 64(2). Iqbal, A. M., et al. (2021). Blended system thinking approach to strengthen the education and training in university-industry research collaboration. Technology Analysis & Strategic Management, 1-14. Iqbal, A. M., et al. (2015). Evaluating national innovation system of malaysia based on university-industry research collaboration: A system thinking approach. Asian Social Science, 11(13), 45. Iqbal, A. M., et al. (2011). Designing of success criteria-based evaluation model for assessing the research collaboration between university and industry. International Journal of Business Research and Management, 2(2), 59-73. Iqbal, A. M., et al. (2015). An efficient evaluation model for the assessment of university-industry research collaboration in Malaysia. Research Journal of Applied Sciences, Engineering and Technology, 10(3), 298-306. Iqbal, A. M., et al. (2012). Determination of high impact evaluation metrics for evaluating the University-industry technological linkage. International Journal of Physical and Social Sciences, 2(4), 111-122. Iqbal, S., et al. (2013). A Modern Strategy for the Development of Academic Staff Based on University-Industry Knowledge Transfer Effectiveness & Collaborative Research. Sains Humanika, 64(3). Jambli, M., et al. (2017). A Dynamic Energy Savvy Routing Algorithm for Mobile Ad-Hoc and Sensor Networks. Advanced Science Letters, 23(6), 5542-5546. Jambli, M., et al. (2017). A survey of cluster based routing protocols for mobile ad-hoc sensor network. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(2-10), 71-78. Jambli, M. N., et al. (2016). A survey of VASNET framework to provide infrastructure-less green IoTs communications for data dissemination in search and rescue operations. Journal of Electronic Science and Technology, 14(3), 220-228. Janis, P., Koivunen, V., Ribeiro, C., Korhonen, J., Doppler, K., & Hugl, K. (2009). Interference-aware resource allocation for device-to-device radio underlaying cellular networks. In VTC Spring IEEE 69th Vehicular Technology Conference, (pp. 1–5). Javed, Y., & Khan, A. S. (2019). Major Security attacks in D2D Communication. Ubiquitous Computing and Communication Journal, 13(1), 12–18. Javed, Y., Khan, A. S., & Abbasi, M. A. K. (2019). Key Security attacks and their remedies in D2D Communication. Ubiquitous Computing and Communication Journal, 13(1), 19–24. Javed, Y., Khan, A. S., Hamid, A, Almuqhim, S., Khan, Z. I., & Abdullah, J. (2019). Securing TLS from MITM Incursion using Diffie-Hellman. In 2019 Second International Conference on Advanced Technologies, Computer Engineering and Science, (pp. 407–411). Javed, Y., Khan, A. S., Qahar, A., & Abdullah, J. (2017). EEoP: A lightweight security scheme over PKI in D2D cellular networks. Journal of Telecommunication, Electronic and Computer Engineering, 9(3), 99–105. Javed, Y., Khan, A. S., Qahar, A., & Abdullah, J. (2017). Preventing DoS Attacks in IoT Using AES. Journal of Telecommunication, Electronic and Computer Engineering, 9(3), 55–60. Javed, Y., et al. (2015). Estimating Diabetic cases in KSA through search trends and Creating Cyber Diabetic Community. In International Conference on Recent Advances in Computer Systems, Atlantis Press. Javed, Y., et al. (2017). EEoP: A lightweight security scheme over PKI in D2D cellular networks. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(3-11), 99-105. Ji, M., Caire, G., & Molisch, A. F. (2015). Fundamental limits of caching in wireless D2D networks. IEEE Transactions on Information Theory, 62(2), 849–869. Jiang, Y., Liu, Q., Zheng, F., Gao, X., & You, X. (2015). Energy-efficient joint resource allocation and power control for D2D communications. IEEE Transactions on Vehicular Technology, 65(8), 6119–6127. Kaleem, Z., Qadri, N. N., Duong, T. Q., & Karagiannidis, G. K. (2019). Energy-efficient device discovery in D2D cellular networks for public safety scenario. IEEE Systems Journal, 1(1), 1–4. Karthikeyan, S., & Nesterenko, M. (2005). RFID security without extensive cryptography. In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, (pp. 63–67). Kato, N. (2016). On device-to-device (D2D) communication. IEEE Network, 30(3), 2–2. Khan, A., et al. (2016). Green Resource Allocation for Multiple OFDMA Based Networks: A Survey. Journal of Electronic Science and Technology, 14(2), 170-182. Khan, A., et al. (2017). Secure and Scalable Group Rekeying for Mobile Multihop Relay Network. Advanced Science Letters, 23(6), 5242-5245. Khan, A., et al. (2014). Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks. Security for Multihop Wireless Networks, 43. Khan, A., et al. (2010). Security Issues of Relay-Based IEEE 802.16 m Network. In 4th International Conference on Post Graduate Education (ICPE-4 2010), 26th-28th November 2010, Mid Velly Cititel Hotel, Kula Lumpur, Malaysia. Khan, A., et al. (2017). Mitigation of Non-Transparent Rouge Relay Stations in Mobile Multihop Relay Networks. Advanced Science Letters, 23(6), 5246-5250. Khan, A., et al. (2017). Security issues in 5G device to device communication. IJCSNS 17(5), 366. Khan, A., et al. (2014). Lightweight message authentication protocol for mobile multihop relay networks. International Review on Computers and Software, 9(10), 1720-1730. Khan, A., et al. (2018). Using Green and Emerging Technology. Asian Journal of Information Technology, 17(1), 23-51. Khan, A., et al. (2015). Comprehensive Review over the Testing Procedures, Mathematical and Software Simulation for the Analysis of Laminated Glass. International Journal of Advance Research in Science & Engineering, 4(2), 2319-8354. Khan, A. S. (2014). Secure and efficient distributed relay-based rekeying algorithm for group communication in mobile multihop relay network. International Journal of Communication Networks and Information Security, 6(3), 189. Khan, A. S., et al. (2021). A Spectrogram image-based Network Anomaly Detection System using Deep Convolutional Neural Network. IEEE Access. Khan, A. S., et al. (2019). Secure trust-based blockchain architecture to prevent attacks in VANET. Sensors 19(22), 4954. Khan, A. S., et al. (2010). An Overview of Security Challenges of Next Generation Mobile Wimax IEEE 802.16 m Technology. In 3rd International Graduate Conference on Engineering, Science and Humanities (IGCESH). Khan, A. S., et al. (2009). Man-in-the-middle attack and possible solutions on Wimax 802.16 j. In Proceedings of International Conference on Recent and Emerging Advance Technologies in Engineering. Khan, A. S., et al. (2010). Efficient distributed authentication key scheme for multi-hop relay in IEEE 802.16 j network. International Journal of Engineering Science and Technology (IJEST), 2(6), 2192-2199. Khan, A. S., et al. (2011). An Efficient Self-Organized Authentication and Key Management Scheme for Distributed Multihop Relay-Based IEEE 802.16 Networks. International Journal of Computer Science and Information Security, 9(3), 30. Khan, A. S., et al. (2011). Secure and Efficient Multicast Rekeying Approach For Non-Transparent Relay-based IEEE 802.16 Networks. International Journal of Computer Applications, 975, 8887. Khan, A. S., et al. Provisioning of Public Key Infrastructure (PKI) and Security Issues in IEEE802. 16m Networks. Khan, A. S., et al. (2011). Security Issues and Modified Version of PKM Protocol in Non-Transparent Multihop Relay in IEEE 802. 16 j Networks. International Review on Computers and Software, 6(1), 104-109. Khan, A. S., et al. (2010). Security zone and key derivation management in centralized security control in wimax multihop relay system. In Proceedings 3rd International Graduate Conference Of Engineering Science, and Humanity. Khan, A. S., et al. (2010). An improved authentication key management scheme for multihop relay in IEEE 802.16 m networks. In 2010 IEEE Asia-Pacific Conference on Applied Electromagnetics (APACE), (pp. 1-5). Khan, A. S., et al. (2015). Secure Authentication and Key Management Protocols for Mobile Multihop WiMAX Networks. Indian Journal of Science and Technology, 7(3), 282. Khan, A. S., et al. (2021). Trust-based lightweight security protocol for device to device multihop cellular communication (TLwS). Journal of Ambient Intelligence and Humanized Computing, 1-18. Khan, N., et al. (2015). Towards vulnerability prevention model for web browser using interceptor approach. In 2015 9th International Conference on IT in Asia (CITA), (pp. 1-5). Khan, N., et al. (2017). Defending malicious script attacks using machine learning classifiers. Wireless Communications and Mobile Computing, 2017. Khan, N., et al. (2017). A Dynamic Method of Detecting Malicious Scripts Using Classifiers. Advanced Science Letters, 23(6), 5352-5355. Khan, N., et al. (2017). A Taxonomy Study of XSS Vulnerabilities. Asian Journal of Information Technology, 16(2-5), 169-177. Khan, S., et al. (2017). Quantum-elliptic curve cryptography for multihop communication in 5G networks. International Journal of Computer Science and Network Security (IJCSNS), 17(5), 357-365. Khan, S., Javed, Y., Abdullah, J., Nazim, J. M., & Khan, N. (2017). Security issues in 5G device to device communication. International Journal of Computer Science and network security, 17(5), 366. Khalid, Z., et al. (2013). M2M communication in virtual sensor network for shaal. Jurnal Teknologi, 65(1). Kim, J. Y., Hu, W., Shafagh, H., & Jha, S. (2016). SEDA: secure over-the-air code dissemination protocol for the Internet of Things. IEEE Transactions on Dependable and Secure Computing, 15(6), 1041–1054. Kim, S. H., & Han, S. J. (2012). Contour routing for peer-to-peer DTN delivery in cellular networks. In 2012 fourth international conference on communication systems and networks, (pp. 1–9). Le, D. N., Le Tuan, L., & Tuan, M. N. D. (2019). Smart-building management system: An Internet-of-Things (IoT) application business model in Vietnam. Technological Forecasting and Social Change, 141, 22–35. Lee, J., Kim, Y., Kwak, Y., Zhang, J., Papasakellariou, A., Novlan, T., & Li, Y. (2016). LTE-advanced in 3GPP Rel-13/14: an evolution toward 5G. IEEE Communications Magazine, 54(3), 36–42. Lee, N. Y., & Chiu, Y. C. (2005). Improved remote authentication scheme with smart card. Computer Standards & Interfaces, 27(2), 177–180. Li, H., Wang, B., Song, Y., & Ramamritham, K. (2016). VeShare: A D2D infrastructure for real-time social-enabled vehicle networks. IEEE Wireless Communications, 23(4), 96–102. Li, S., Da Xu, L., & Zhao, S. (2018). 5G Internet of Things: A survey. Journal of Industrial Information Integration, 10, 1–9. Li, Y., Chi, K., Chen, H., Wang, Z., & Zhu, Y. (2017). Narrowband Internet of Things systems with opportunistic D2D communication. IEEE Internet of Things Journal, 5(3), 1474–1484. Li, Y., Wu, T., Hui, P., Jin, D., & Chen, S. (2014). Social-aware D2D communications: Qualitative insights and quantitative analysis. IEEE Communications Magazine, 52(6), 150–158. Lien, S. Y., Chien, C. C., Tseng, F. M., & Ho, T. C. (2016). 3GPP device-to-device communications for beyond 4G cellular networks. IEEE Communications Magazine, 54(3), 29–35. Liu, J., Kato, N., Ma, J., & Kadowaki, N. (2014). Device-to-device communication in LTE-advanced networks: A survey. IEEE Communications Surveys & Tutorials, 17(4), 1923–1940. Liu, J., Zhang, S., Kato, N., Ujikawa, H., & Suzuki, K. (2015). Device-to-device communications for enhancing quality of experience in software defined multi-tier LTE-A networks. IEEE Network, 29(4), 46–52. Lenando, H., et al. (2015). Neighbor selection protocol for heterogeneous information dissemination in Opportunistic Networks. In 2015 9th International Conference on IT in Asia (CITA), (pp. 1-7). Lenando, H., et al. (2014). Identify the best location to place data based on social interaction in opportunistic network. In The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), (pp. 1-6). Lu, P., Zhang, L., Liu, X., Yao, J., & Zhu, Z. (2015). Highly efficient data migration and backup for big data applications in elastic optical inter-data-center networks. IEEE Network, 29(5), 36–42. Mach, P., Becvar, Z., & Najla, M. (2018). Combined Shared and Dedicated Resource Allocation for D2D communication. In 2018 IEEE 87th Vehicular Technology Conference, (pp. 1–7). Maikol, S. O., et al. (2021). A Novel Authentication and Key Agreement Scheme for Countering MITM and Impersonation Attack in Medical Facilities. International Journal of Integrated Engineering, 13(2), 127-135. Malandrino, F., Casetti, C., & Chiasserini, C. F. (2014). Toward D2D-enhanced heterogeneous networks. IEEE Communications Magazine, 52(11), 94–100. Mallana, M. F. B., Iqbal, A.M., Iqbal S., Khan A.S., Senin, A.A., (2013). The critical factors for the successful transformation of technology from developed to developing countries. Jurnal Teknologi, 64(3). Mao, W. (2003). Modern cryptography: theory and practice. Pearson Education India. Meister, D. (2013). Advanced data deduplication techniques and their application, Doctoral dissertation, Johannes Gutenberg University Mainz. Melki, L., Najeh, S., & Besbes, H. (2016). Interference management scheme for network-assisted multi-hop D2D communications. In 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, (pp. 1–5). Militano, L., Orsino, A., Araniti, G., Nitti, M., Atzori, L., & Iera, A. (2016). Trusted D2D-based data uploading in in-band narrowband-IoT with social awareness. In 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, (pp. 1–6). Mishra, P. K., & Pandey, S. (2016, August). A Method for Mode Selection in a dynamic network for Device-to-Device Communication for 5G. In Proceedings of the International Conference on Informatics and Analytics (pp. 1-6). Monserrat, J. F., Mange, G., Braun, V., Tullberg, H., Zimmermann, G., & Bulakci, Ö. (2015). METIS research advances towards the 5G mobile and wireless system definition. EURASIP Journal on Wireless Communications and Networking, 2015(1), 53. Nardini, G., Stea, G., & Virdis, A. (2017). A fast and reliable broadcast service for LTE-Advanced exploiting multihop device-to-device transmissions. Future Internet, 9(4), 89. Nasrallah, A., Thyagaturu, A. S., Alharbi, Z., Wang, C., Shao, X., Reisslein, M., & ElBakoury, H. (2018). Ultra-low latency (ULL) networks: The IEEE TSN and IETF DetNet standards and related 5G ULL research. IEEE Communications Surveys & Tutorials, 21(1), 88–145. Ni, J., Lin, X., & Shen, X. S. (2018). Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE Journal on Selected Areas in Communications, 36(3), 644–657. Nisar, K., et al. (2021). Evolutionary Integrated Heuristic with Gudermannian Neural Networks for Second Kind of Lane–Emden Nonlinear Singular Models. Applied Sciences, 11(11), 4725. Nomikos, N., Charalambous, T., Krikidis, I., Skoutas, D. N., Vouyioukas, D., Johansson, M., & Skianis, C. (2015). A survey on buffer-aided relay selection. IEEE Communications Surveys & Tutorials, 18(2), 1073–1097. Noura, M., & Nordin, R. (2016). A survey on interference management for device-to-device (D2D) communication and its challenges in 5G networks. Journal of Network and Computer Applications, 71, 130–150. Ometov, A., Olshannikova, E., Masek, P., Olsson, T., Hosek, J., Andreev, S., & Koucheryavy, Y. (2016). Dynamic trust associations over socially-aware D2D technology: A practical implementation perspective. IEEE Access, 4, 7692–7702. Ometov, A., Zhidanov, K., Bezzateev, S., Florea, R., Andreev, S., & Koucheryavy, Y. (2015, August). Securing network-assisted direct communication: The case of unreliable cellular connectivity. In 2015 IEEE Trustcom/BigDataSE/ISPA (Vol. 1, pp. 826–833). Othmen, S., Zarai, F., Belghith, A., Obaidat, M. S., & Kamoun, L. (2017). Secure and Reliable Multi-Path Routing Protocol for Multi-Hop Wireless Networks. Adhoc & Sensor Wireless Networks, 36. Oueis, J., Conan, V., Lavaux, D., Stanica, R., & Valois, F. (2017). Overview of LTE isolated E-UTRAN operation for public safety. IEEE Communications Standards Magazine, 1(2), 98–105. Panaousis, E., Alpcan, T., Fereidooni, H., & Conti, M. (2014). Secure message delivery games for device-to-device communications. In International Conference on Decision and Game Theory for Security, (pp. 195–215). Phunchongharn, P., Hossain, E., & Kim, D. I. (2013). Resource allocation for device-to-device communications underlaying LTE-advanced networks. IEEE Wireless Communications, 20(4), 91–100. Qin, H., Mi, Z., Dong, C., Peng, F., & Sheng, P. (2016). An experimental study on multihop D2D communications based on smartphones. In 2016 IEEE 83rd Vehicular Technology Conference, (pp. 1–5). Raghothaman, B., Deng, E., Pragada, R., Sternberg, G., Deng, T., & Vanganuru, K. (2013, January). Architecture and protocols for LTE-based device to device communication. In 2013 International Conference on Computing, Networking and Communications, (pp. 895–899). Rakshanda, J., & Yadav, M. R. L. (2013). Network Security: A Detailed Review. International Journal For Technological Research In Engineering, 4(11), 2380-2384. Ramadan, M., Li, F., Xu, C., Mohamed, A., Abdalla, H., & Ali, A. A. (2016). User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System. Inetrnational Journal of Network Security, 18(4), 769–781. Raya, M., Papadimitratos, P., & Hubaux, J. P. (2006). Securing vehicular communications. IEEE wireless communications, 13(5), 8–15. Raymond, D. R., & Midkiff, S. F. (2008). Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing, 7(1), 74–81. Renauld, M., Standaert, F. X., Veyrat-Charvillon, N., Kamel, D., & Flandre, D. (2011). A formal study of power variability issues and side-channel attacks for nanoscale devices. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, (pp. 109–128). Safdar, H., et al. (2013). Resource allocation for uplink M2M communication: A game theory approach. In 2013 IEEE Symposium on Wireless Technology & Applications (ISWTA), (pp. 48–52). Salawu, N., et al. (2013). A cost function algorithm for mobility load balancing in long term evolution networks. Sakr, A. H., & Hossain, E. (2015). Cognitive and energy harvesting-based D2D communication in cellular networks: Stochastic geometry modeling and analysis. IEEE Transactions on Communications, 63(5), 1867–1880. Sedidi, R., & Kumar, A. (2016). Key exchange protocols for secure Device-to-Device (D2D) communication in 5G. In 2016 Wireless Days, (pp. 1–6). Shahid Khan, A., et al. (2009). Man-in-the-middle attack and possible solutions on wimax 802.16 j. In Proceedings of International Conference on Recent and Emerging Advance Technologies in Engineering. Shalmashi, S., Miao, G., & Slimane, S. B. (2013). Interference management for multiple device-to-device communications underlaying cellular networks. In 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, (pp. 223–227). Shaneshin, M., et al. (2010). An overview of Femtocell architecture in collaboration with Wimax application. In 3rd International Graduate Conference on Engineering, Science and Humanities (IGCESH). School of Graduate Studues Universiti Teknologi Malaysia. Sharma, V., You, I., Leu, F. Y., & Atiquzzaman, M. (2018). Secure and efficient protocol for fast handover in 5G mobile Xhaul networks. Journal of Network and Computer Applications, 102, 38–57. Shen, W., Yin, B., Cao, X., Cai, L. X., & Cheng, Y. (2016). Secure device-to-device communications over WiFi direct. IEEE Network, 30(5), 4–9. Shen, Z., Papasakellariou, A., Montojo, J., Gerstenberger, D., & Xu, F. (2012). Overview of 3GPP LTE-advanced carrier aggregation for 4G wireless communications. IEEE Communications Magazine, 50(2), 122–130. Shukla, V., Chaturvedi, A., & Srivastava, N. (2015). A new secure authenticated key agreement scheme for wireless (mobile) communication in an EHR system using cryptography. Communication on Applied Electronics, 3(3), 16–21. Steinfeld, R., & Zheng, Y. (2000). A signcryption scheme based on integer factorization. In International Workshop on Information Security, (pp. 308–322). Sufatrio, A. & Yap, R. H. C. (2008). Extending BAN logic for reasoning with modern PKI-based protocols. In 2008 IFIP International Conference on Network and Parallel Computing, (pp. 190–197). Suo, H., Wan, J., Zou, C., & Liu, J. (2012). Security in the internet of things: a review. In 2012 international conference on computer science and electronics engineering, (Vol. 3, pp. 648–651). Ta, T., Baras, J. S., & Zhu, C. (2014). Improving smartphone battery life utilizing device-to-device cooperative relays underlaying LTE networks. In 2014 IEEE International Conference on Communications, (pp. 5263–5268). Tata, C., & Kadoch, M. (2014). Multipath routing algorithm for device-to-device communications for public safety over LTE heterogeneous networks. In 2014 1st International conference on information and communication technologies for disaster management, (pp. 1–7). Tehrani, M. N., Uysal, M., & Yanikomeroglu, H. (2014). Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Communications Magazine, 52(5), 86–92. Theobald, L. M., Wu, D., Choi, K. W., & Han, Z. (2014). Device-to-device discovery for proximity-based service in LTE-advanced system. IEEE Journal on Selected Areas in Communications, 33(1), 55–66. Tran, K. A. (2018). Resource allocation in D2D communication in cellular mode. Journal of Advanced Engineering and Computation, 2(3), 197–207. Trifunovic, S., Distl, B., Schatzmann, D., & Legendre, F. (2011). WiFi-Opp: ad-hoc-less opportunistic networking. In Proceedings of the 6th ACM workshop on Challenged networks, (pp. 37–42). Turkanović, M., Brumen, B., & Hölbl, M. (2014). A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Networks, 20, 96–112. U. Khan, C. E. T., A. S. Khan (2014). The Enhanced Amplify-and-Forward Three Time Slots TDMA-Based Protocol Using Inter-Relay Communication Over Rician Fading Channel. International Review on Computers and Software 9(8), 1384-1391. Ullah, R., et al. (2013). Voronoi cell geometry based dynamic fractional frequency reuse for OFDMA cellular networks. In 2013 IEEE International Conference on Signal and Image Processing Applications, (pp. 435-440). Vanganuru, K., Ferrante, S., & Sternberg, G. (2012). System capacity and coverage of a cellular network with D2D mobile relays. In MILCOM 2012-2012 IEEE Military Communications Conference, (pp. 1–6). Vetter, S., Nohria, R., & Santos, G. (2018). IBM power system AC922 introduction and technical overview. IBM Redbooks. Wallner, D., Harder, E., & Agee, R. (1999). RFC2627: Key Management for Multicast: Issues and Architectures. RFC 2627. Wang, H., & Chu, X. (2012). Distance-constrained resource-sharing criteria for device-to-device communications underlaying cellular networks. Electronics Letters, 48(9), 528–530. Wang, L., Li, Z., Chen, M., Zhang, A., Cui, J., & Zheng, B. (2017). Secure content sharing protocol for D2D users based on profile matching in social networks. In 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), (pp. 1–5). Wang, L., Tian, F., Svensson, T., Feng, D., Song, M., & Li, S. (2015). Exploiting full duplex for device-to-device communications in heterogeneous networks. IEEE Communications Magazine, 53(5), 146–152. Wang, P., & Yu, R. (2019). SMF-GA: Optimized Multitask Allocation Algorithm in Urban Crowdsourced Transportation. Wireless Communications and Mobile Computing, 1(1), 1–13. Wei, L., Hu, R. Q., Qian, Y., & Wu, G. (2014). Enable device-to-device communications underlaying cellular networks: challenges and research aspects. IEEE Communications Magazine, 52(6), 90–96. Wen, S., Zhu, X., Zhang, X., & Yang, D. (2013). QoS-aware mode selection and resource allocation scheme for device-to-device (D2D) communication in cellular networks. In 2013 IEEE International Conference on Communications Workshops, (pp. 101–105). Wong, V. W. (Ed.). (2017). Key technologies for 5G wireless systems. Cambridge University Press. Xiaolong, H., et al. (2021). Soft Computing and Decision Support System for Software Process Improvement: A Systematic Literature Review. Scientific Programming, 2021. Xi, W., Li, X. Y., Qian, C., Han, J., Tang, S., Zhao, J., & Zhao, K. (2014). KEEP: Fast secret key extraction protocol for D2D communication. In 2014 IEEE 22nd International Symposium of Quality of Service, (pp. 350–359). Yang, C. C., Wang, R. C., & Liu, W. T. (2005). Secure authentication scheme for session initiation protocol. Computers & Security, 24(5), 381–386. Yang, M. J., Lim, S. Y., Park, H. J., & Park, N. H. (2013). Solving the data overload: Device-to-device bearer control architecture for cellular data offloading. IEEE Vehicular Technology Magazine, 8(1), 31–39. Yao, J., Wang, T., Chen, M., Wang, L., & Chen, G. (2016). GBS-AKA: Group-based secure authentication and key agreement for M2M in 4G network. In 2016 International Conference on Cloud Computing Research and Innovations, (pp. 42–48). Yilmaz, O. N., Li, Z., Valkealahti, K., Uusitalo, M. A., Moisio, M., Lundén, P., & Wijting, C. (2014, April). Smart mobility management for D2D communications in 5G networks. In 2014 IEEE Wireless Communications and Networking Conference Workshops, (pp. 219–223). Yin, W., Wen, Q., Li, W., Zhang, H., & Jin, Z. (2018). An anti-quantum transaction authentication approach in blockchain. IEEE Access, 6, 5393–5401. Zen, K., et al. (2015). Intelligent coordinator selection mechanism (ICSM) for IEEE802. 15.4 Beacon-Enabled MAC protocol in mobile wireless sensor networks [J]. International Review on Computers and Software, 10(2), 164. Zhang, A., Wang, L., Ye, X., & Lin, X. (2016). Light-weight and robust security-aware D2D-assist data transmission protocol for mobile-health systems. IEEE Transactions on Information Forensics and Security, 12(3), 662–675. Zhang, A., Zhou, L., & Wang, L. (2016). Security-aware device-to-device communications underlaying cellular networks. Springer International Publishing. Zhang, H., Liu, N., Chu, X., Long, K., Aghvami, A. H., & Leung, V. C. (2017). Network slicing based 5G and future mobile networks: mobility, resource management, and challenges. IEEE Communications Magazine, 55(8), 138–145. Zhang, K., & Xuemin Shen. (2015). Security and privacy for mobile healthcare networks. IEEE Wireless Communications, 22(4), 104–112. Zhao, C., Yang, S., Yang, X., & McCann, J. A. (2016). Rapid, user-transparent, and trustworthy device pairing for d2d-enabled mobile crowdsourcing. IEEE Transactions on Mobile Computing, 16(7), 2008–2022. Zhou, Z., Dong, M., Ota, K., Wu, J., & Sato, T. (2014). Energy efficiency and spectral efficiency tradeoff in device-to-device (D2D) communications. IEEE Wireless Communications Letters, 3(5), 485–488. Zubair, S., et al. (2015). Lightweight distributed geographical: A lightweight distributed protocol for virtual clustering in geographical forwarding cognitive radio sensor networks. International Journal of Communication Systems, 28(1), 1-18. Zulhasnine, M., Huang, C., & Srinivasan, A. (2010). Efficient resource allocation for device-to-device communication underlaying LTE network. In 2010 IEEE 6th International conference on wireless and mobile computing, networking and communications, (pp. 368–375). |