SDR Implementation of a D2D Security Cryptographic Mechanism

Device-to-device (D2D) communication represents a promising technique to enable devices to communicate directly without the interaction of access points or base stations. The ad hoc and proximity nature of this communication introduce some very important security vulnerabilities. Key management, access control, privacy, secure routing, and transmission need dedicated signaling procedures and optimized implementation mechanisms that are appropriate for the mobile, low-energy, and low-processing power environment. This paper proposes a security mechanism for D2D communication involving the use of physically unclonable functions (PUF) for unique key generation, elliptic-curve cryptography (ECC) and Diffie–Hellman key exchange (DHKE) for key management, and Salsa20/20 as stream cyphering encryption method, suitable for confidentiality of the wireless transmissions. All these methods are implemented and tested on a software defined radio (SDR) communication platform consisting of a Zync-based system-on-chip (SoC), complemented by radio frequency (RF) daughter boards from analog devices–an integration using hardware and software co-design.

[1]  Yu Cheng,et al.  Secure key establishment for Device-to-Device communications , 2014, 2014 IEEE Global Communications Conference.

[2]  Friedrich Jondral,et al.  Software-Defined Radio—Basics and Evolution to Cognitive Radio , 2005, EURASIP J. Wirel. Commun. Netw..

[3]  Masoumeh Safkhani,et al.  IoT Device Security: Challenging “A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function” , 2018, Sensors.

[4]  Yacine Challal,et al.  Security in device-to-device communications: a survey , 2018, IET Networks.

[5]  Alexandra Stanciu,et al.  SYSTEM ON CHIP DEVELOPMENT PLATFORM FOR SOFTWARE DEFINED RADIO , 2018 .

[6]  Marcian N. Cirstea,et al.  Analysis and Evaluation of PUF-Based SoC Designs for Security Applications , 2016, IEEE Transactions on Industrial Electronics.

[7]  Martin Schramm,et al.  A Vendor-Neutral Unified Core for Cryptographic Operations in GF(p) and GF(sm) Based on Montgomery Arithmetic , 2018, Secur. Commun. Networks.

[8]  Zheng Yan,et al.  A Survey on Security in D2D Communications , 2017, Mob. Networks Appl..

[9]  Jörg Ott,et al.  Security and Privacy in Device-to-Device (D2D) Communication: A Review , 2017, IEEE Communications Surveys & Tutorials.

[10]  Enrique Festijo,et al.  Joint operation of routing control and group key management for 5G ad hoc D2D networks , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).

[11]  Suresh C. Mehrotra,et al.  A Review on Elliptic Curve Cryptography for Embedded Systems , 2011, ArXiv.

[12]  J-E·埃克伯格,et al.  Device to device communication security , 2013 .

[13]  Kyungtae Kang,et al.  Secure Device-to-Device Authentication in Mobile Multi-hop Networks , 2014, WASA.

[14]  Aiqing Zhang,et al.  SeDS: Secure Data Sharing Strategy for D2D Communication in LTE-Advanced Networks , 2016, IEEE Transactions on Vehicular Technology.

[15]  Ajithkumar,et al.  A survey on security of mobile handheld devices through elliptic curve cryptography , 2016 .

[16]  Debdeep Mukhopadhyay,et al.  Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database , 2019, IEEE Transactions on Dependable and Secure Computing.