SDR Implementation of a D2D Security Cryptographic Mechanism

Device-to-device (D2D) communication represents a promising technique to enable devices to communicate directly without the interaction of access points or base stations. The ad hoc and proximity nature of this communication introduce some very important security vulnerabilities. Key management, acc...

Full description

Bibliographic Details
Main Authors: Titus Balan, Alexandra Balan, Florin Sandu
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8667414/
id doaj-fa99bc796cee44038c843bc225b12451
record_format Article
spelling doaj-fa99bc796cee44038c843bc225b124512021-04-05T17:00:36ZengIEEEIEEE Access2169-35362019-01-017388473885510.1109/ACCESS.2019.29049098667414SDR Implementation of a D2D Security Cryptographic MechanismTitus Balan0https://orcid.org/0000-0002-6839-9279Alexandra Balan1Florin Sandu2Department of Electronics and Computers, Transilvania University of Braşov, Braşov, RomaniaDepartment of Electronics and Computers, Transilvania University of Braşov, Braşov, RomaniaDepartment of Electronics and Computers, Transilvania University of Braşov, Braşov, RomaniaDevice-to-device (D2D) communication represents a promising technique to enable devices to communicate directly without the interaction of access points or base stations. The ad hoc and proximity nature of this communication introduce some very important security vulnerabilities. Key management, access control, privacy, secure routing, and transmission need dedicated signaling procedures and optimized implementation mechanisms that are appropriate for the mobile, low-energy, and low-processing power environment. This paper proposes a security mechanism for D2D communication involving the use of physically unclonable functions (PUF) for unique key generation, elliptic-curve cryptography (ECC) and Diffie-Hellman key exchange (DHKE) for key management, and Salsa20/20 as stream cyphering encryption method, suitable for confidentiality of the wireless transmissions. All these methods are implemented and tested on a software defined radio (SDR) communication platform consisting of a Zync-based system-on-chip (SoC), complemented by radio frequency (RF) daughter boards from analog devices-an integration using hardware and software co-design.https://ieeexplore.ieee.org/document/8667414/Device to deviceDiffie-Hellman key exchangeencryptionelliptic-curve cryptographykey managementphysically unclonable function
collection DOAJ
language English
format Article
sources DOAJ
author Titus Balan
Alexandra Balan
Florin Sandu
spellingShingle Titus Balan
Alexandra Balan
Florin Sandu
SDR Implementation of a D2D Security Cryptographic Mechanism
IEEE Access
Device to device
Diffie-Hellman key exchange
encryption
elliptic-curve cryptography
key management
physically unclonable function
author_facet Titus Balan
Alexandra Balan
Florin Sandu
author_sort Titus Balan
title SDR Implementation of a D2D Security Cryptographic Mechanism
title_short SDR Implementation of a D2D Security Cryptographic Mechanism
title_full SDR Implementation of a D2D Security Cryptographic Mechanism
title_fullStr SDR Implementation of a D2D Security Cryptographic Mechanism
title_full_unstemmed SDR Implementation of a D2D Security Cryptographic Mechanism
title_sort sdr implementation of a d2d security cryptographic mechanism
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2019-01-01
description Device-to-device (D2D) communication represents a promising technique to enable devices to communicate directly without the interaction of access points or base stations. The ad hoc and proximity nature of this communication introduce some very important security vulnerabilities. Key management, access control, privacy, secure routing, and transmission need dedicated signaling procedures and optimized implementation mechanisms that are appropriate for the mobile, low-energy, and low-processing power environment. This paper proposes a security mechanism for D2D communication involving the use of physically unclonable functions (PUF) for unique key generation, elliptic-curve cryptography (ECC) and Diffie-Hellman key exchange (DHKE) for key management, and Salsa20/20 as stream cyphering encryption method, suitable for confidentiality of the wireless transmissions. All these methods are implemented and tested on a software defined radio (SDR) communication platform consisting of a Zync-based system-on-chip (SoC), complemented by radio frequency (RF) daughter boards from analog devices-an integration using hardware and software co-design.
topic Device to device
Diffie-Hellman key exchange
encryption
elliptic-curve cryptography
key management
physically unclonable function
url https://ieeexplore.ieee.org/document/8667414/
work_keys_str_mv AT titusbalan sdrimplementationofad2dsecuritycryptographicmechanism
AT alexandrabalan sdrimplementationofad2dsecuritycryptographicmechanism
AT florinsandu sdrimplementationofad2dsecuritycryptographicmechanism
_version_ 1721540545716682752