Security issues in 5G device to device communication

5G is a promising technology that will support high connectivity and device to device communication. It also promises to improve the existing technologies and will support them. Existing LTE-A utilize centralized communication scheme where all the authentication mechanisms need to go through the bas...

Full description

Bibliographic Details
Main Authors: Khan, A.S., Yasir, Javed, Johari, Abdullah, Nazim, J.M., Khan, N.
Format: Article
Language:English
Published: IJCSNS 2017
Subjects:
Online Access:http://ir.unimas.my/id/eprint/17236/
http://ir.unimas.my/id/eprint/17236/1/Security%20issues%20in%205G%20device%20to%20device%20communication%20%28abstract%29.pdf
_version_ 1848838245413027840
author Khan, A.S.
Yasir, Javed
Johari, Abdullah
Nazim, J.M.
Khan, N.
author_facet Khan, A.S.
Yasir, Javed
Johari, Abdullah
Nazim, J.M.
Khan, N.
author_sort Khan, A.S.
building UNIMAS Institutional Repository
collection Online Access
description 5G is a promising technology that will support high connectivity and device to device communication. It also promises to improve the existing technologies and will support them. Existing LTE-A utilize centralized communication scheme where all the authentication mechanisms need to go through the base station. This centralized authentication mechanism may generate authentication and key management overhead as well as computational complexity, thus not in line with the 5G requirements. On the other hand, distributed communication scheme lacks hop by hop authentication, thus, it is challenging to share the initial security credentials within the relay stations at multi-hop. Secondly, distributed communication scheme required decode and forward relays, a partial intelligent relays that can act as a semi base stations. Such relays are known as non-transparent relays. However, inclusion of such intelligent relays can leads towards a ROGUE RELAY STATION (RRS) attacks, which consequently generate Replay attacks, DoS and the MITM (where mutual authentication is absent). RRS can generate interleaving attack even in the presence of mutual authentication.
first_indexed 2025-11-15T06:52:29Z
format Article
id unimas-17236
institution Universiti Malaysia Sarawak
institution_category Local University
language English
last_indexed 2025-11-15T06:52:29Z
publishDate 2017
publisher IJCSNS
recordtype eprints
repository_type Digital Repository
spelling unimas-172362024-01-09T03:47:08Z http://ir.unimas.my/id/eprint/17236/ Security issues in 5G device to device communication Khan, A.S. Yasir, Javed Johari, Abdullah Nazim, J.M. Khan, N. QA75 Electronic computers. Computer science 5G is a promising technology that will support high connectivity and device to device communication. It also promises to improve the existing technologies and will support them. Existing LTE-A utilize centralized communication scheme where all the authentication mechanisms need to go through the base station. This centralized authentication mechanism may generate authentication and key management overhead as well as computational complexity, thus not in line with the 5G requirements. On the other hand, distributed communication scheme lacks hop by hop authentication, thus, it is challenging to share the initial security credentials within the relay stations at multi-hop. Secondly, distributed communication scheme required decode and forward relays, a partial intelligent relays that can act as a semi base stations. Such relays are known as non-transparent relays. However, inclusion of such intelligent relays can leads towards a ROGUE RELAY STATION (RRS) attacks, which consequently generate Replay attacks, DoS and the MITM (where mutual authentication is absent). RRS can generate interleaving attack even in the presence of mutual authentication. IJCSNS 2017 Article PeerReviewed text en http://ir.unimas.my/id/eprint/17236/1/Security%20issues%20in%205G%20device%20to%20device%20communication%20%28abstract%29.pdf Khan, A.S. and Yasir, Javed and Johari, Abdullah and Nazim, J.M. and Khan, N. (2017) Security issues in 5G device to device communication. International Journal of Computer Science and Network Security, 17 (5). ISSN 1738-7906 https://www.researchgate.net/publication/317822249
spellingShingle QA75 Electronic computers. Computer science
Khan, A.S.
Yasir, Javed
Johari, Abdullah
Nazim, J.M.
Khan, N.
Security issues in 5G device to device communication
title Security issues in 5G device to device communication
title_full Security issues in 5G device to device communication
title_fullStr Security issues in 5G device to device communication
title_full_unstemmed Security issues in 5G device to device communication
title_short Security issues in 5G device to device communication
title_sort security issues in 5g device to device communication
topic QA75 Electronic computers. Computer science
url http://ir.unimas.my/id/eprint/17236/
http://ir.unimas.my/id/eprint/17236/
http://ir.unimas.my/id/eprint/17236/1/Security%20issues%20in%205G%20device%20to%20device%20communication%20%28abstract%29.pdf