Quantum based flexible secure authentication protocol (SAP) for device to device (D2D) communication
Payal Tayade,P. Vijaya Kumar
DOI: https://doi.org/10.1007/s11082-023-05018-x
IF: 3
2023-07-01
Optical and Quantum Electronics
Abstract:Comprehensive inquisition of wireless communication with flexible quantum electronics and physics can be considered as one of the blooming technology. Quantum Cryptography which extends from combination of quantum electronics and physics is one of the best technology that helps to transfer data securely between various user's, due to its rudimentary concept of Quantum Key Distribution (QKD). There are two major concerns in the communication. The first concern is for the data transmission which is frequently carried out through some entity of the cellular network such as Home subscriber Server (HSS) or Gateway (GW), and Evolved Node B(eNB), which is inadvisable to preserve confidentiality of the message. The second concern is, device-to-device (D2D) communication via prose function which is relatively a threat affected path that can be easily affected by the man in the middle (MitM) attack, message drop attack, replay attack, denial of service (DoS) attack, impersonation attack.. To mitigate these threats, this research work is proposing a Secure Authentication Protocol (SAP). The proposed SAP is categorized into 5 phases namely framework of network, enrolment phase, D2D discovery phase, key production—authentication phase and content conveyance phase. Framework of network phase generates function parameters. Enrolment phase registers all user equipment (UE) for verification and also generate an appropriate user application code for respective UE. In this phase, HSS also manages a database that contains detail about all the enrolled. D2D discovery phase allows the UE to discover the neighbors under that proximity area. During the authentication phase, public as well as private secret keys are generated using Elliptic Curve Cryptography (ECC) and Elliptic Curve Diffie-Hellman (ECDH) algorithm. In addition to that, this phase implements hash based message authentication code (HMAC) to create application associated keys. In the last phase of content conveyance, most important step is to share Shared Secret Key (SSK) as it mainly responsible while decrypting original message. To make this transmission very secure, quantum channel is used. Quantum Cryptography plays a vital role in this phase for providing security to whole transmission process at high level. Now a days, advanced optical technologies are also using quantum cryptography to establish secured communication. The performance of the proposed SAP is evaluated and compared with the existing protocols by using multiple evaluation criteria such as cost of operation, computational overhead, storage overhead and energy consumption. This article also provides insights into various security threats such as MitM, replay attack, DoS attack, impersonation attack, known key attack due to use of ECC and ECDH. Also, SAP provides a strong pillar against eavesdropping attack due to quantum cryptography. Also, Bennett and Gilles Brassard (BB84) protocol linked with quantum electronics and physics, place a significant role for creation of quantum channel over classical channel, which took security of SAP at next level.
engineering, electrical & electronic,optics,quantum science & technology