Header menu link for other important links
X
Ecc based dual authentication of user equipment for d2d communication in lte
P.P. Tayade,
Published in Science and Engineering Research Support Society
2020
Volume: 29
   
Issue: 5
Pages: 417 - 426
Abstract
Rapid development of device to device (D2D) communication in fourth generation (4G) Long Term Evolution-Advanced (LTE-A) networks, accomplish authentication of user equipments as one of the pivotal issue. In this paper, a protocol for dual authentication of user equipment is proposed. The advantage of public key cryptography under Elliptic Curve Cryptography (ECC) is to achieve security between two user equipments in D2D communication. Explicitly, for first authentication, validation of certificate is performed which guarantees entity authentication. If first authentication is successfully completed, verification of blind entity ensures the second authentication. A notable and the silent feature of the proposed protocol is, it maintains and discloses the record of user equipment with their unique code, expiration time and data and malicious behaviour count. The proposed protocol is undeniably an efficient feasible solution to achieve dual authentication of user equipment, has proved through comprehensive analysis and results. © 2020 SERSC.
About the journal
JournalInternational Journal of Advanced Science and Technology
PublisherScience and Engineering Research Support Society
ISSN20054238