A Hybrid Cryptographic System for Secured Device to Device Communication

It is general fact that even after enormous expansion of wireless communication there are still dead regions that hampers the effective communication. With exponential rise in the smart phones, a new layer of communication has evolved that could address the concerns of dead regions and capacity barriers. D2D is the evolving communication technology which focuses on short distance hops between the public devices to reach the destination. The major drawback of this technology is that most of the devices are public hence trustworthiness of the entire channel needs to be addressed in order to make it a viable solution. In this paper, we introduce a novel hybrid cryptographic approach that could address multiple eavesdroppers’ scenario. This approach incorporates both Huffman coding and Binary coding to enhance the crypto benefits for the information transmitted over D2D channel that consists of several public devices. The dual-crypto nature of the proposed algorithm offers higher efficiency, better security and improved key transmission.  Thus, the proposed hybrid cryptographic approach is robust in nature while easy and simple to operate. In addition, the proposed approach could recover the original information without any distortion from the encrypted data making the approach lossless in nature. Further simulation results prove that the proposed offers confidentiality to the transmitted to data while addressing the network capacity crunch.

[1]  Hyunsoo Kwon,et al.  Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks , 2016, Multimedia Tools and Applications.

[2]  Jonathan Knudsen Java cryptography , 1998, Java series.

[3]  Edoardo Persichetti Secure and Anonymous Hybrid Encryption from Coding Theory , 2013, PQCrypto.

[4]  Gary Steri,et al.  Connectivity and security in a D2D communication protocol for public safety applications , 2014, 2014 11th International Symposium on Wireless Communications Systems (ISWCS).

[5]  Jeffrey G. Andrews,et al.  Power Control for D2D Underlaid Cellular Networks: Modeling, Algorithms, and Analysis , 2013, IEEE Journal on Selected Areas in Communications.

[6]  Yu Cheng,et al.  Secure key establishment for Device-to-Device communications , 2014, 2014 IEEE Global Communications Conference.

[7]  M.I. Aziz,et al.  Introduction to Cryptography , 2002, 2005 International Conference on Microelectronics.

[8]  Srinivasan Nagaraj,et al.  A Bio-Crypto Protocol for Password Protection Using ECC , 2015 .

[9]  Sunil Mane,et al.  Bluetooth Communication using Hybrid Encryption Algorithm based on AES and RSA , 2013 .

[10]  Emad Abd-Elrahman,et al.  D2D group communications security , 2015, 2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS).

[11]  James L. Massey,et al.  Some applications of source coding in cryptography , 2010, Eur. Trans. Telecommun..

[12]  Dingding Jia,et al.  Related-Key Security for Hybrid Encryption , 2014, ISC.

[13]  Trung Quang Duong,et al.  Secure D2D communication in large-scale cognitive cellular networks with wireless power transfer , 2015, 2015 IEEE International Conference on Communications (ICC).

[14]  Hossam Afifi,et al.  Fast group discovery and non-repudiation in D2D communications using IBE , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).

[15]  Ronald L. Rivest,et al.  On breaking a Huffman code , 1996, IEEE Trans. Inf. Theory.

[16]  K Tejaswi,et al.  Ortho Linear Feedback Shift Register Cryptographic System , 2015 .

[17]  Chandrashekhar Meshram,et al.  Discrete Logarithm and Integer Factorization using ID-based Encryption , 2015 .