{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T10:13:45Z","timestamp":1755598425868,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,10,4]],"date-time":"2022-10-04T00:00:00Z","timestamp":1664841600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,10,4]],"date-time":"2022-10-04T00:00:00Z","timestamp":1664841600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["739578"],"award-info":[{"award-number":["739578"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s10207-022-00620-8","type":"journal-article","created":{"date-parts":[[2022,10,4]],"date-time":"2022-10-04T16:02:46Z","timestamp":1664899366000},"page":"1389-1408","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A security protocol for D2D communications in 5G networks using elliptic curve cryptography"],"prefix":"10.1007","volume":"21","author":[{"given":"R.","family":"Kishore","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1562-5543","authenticated-orcid":false,"given":"I.","family":"Ioannou","sequence":"additional","affiliation":[]},{"given":"C.","family":"Christophorou","sequence":"additional","affiliation":[]},{"given":"N.","family":"Prabagarane","sequence":"additional","affiliation":[]},{"given":"V.","family":"Vassiliou","sequence":"additional","affiliation":[]},{"given":"S.","family":"Vignesh","sequence":"additional","affiliation":[]},{"given":"H.","family":"Vinayak","sequence":"additional","affiliation":[]},{"given":"S.","family":"Venkatesh","sequence":"additional","affiliation":[]},{"given":"A.","family":"Pitsillides","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,4]]},"reference":[{"issue":"4","key":"620_CR1","doi-asserted-by":"publisher","first-page":"3970","DOI":"10.1109\/JSYST.2017.2773633","volume":"12","author":"R Ansari","year":"2018","unstructured":"Ansari, R., Chrysostomou, C., Hassan, S., Guizani, M., Mumtaz, S., Rodriguez, J., Rodrigues, J.: 5G D2D Networks: Techniques, Challenges, and Future Prospects. IEEE Syst. J. 12(4), 3970\u20133984 (2018)","journal-title":"IEEE Syst. J."},{"key":"620_CR2","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.jnca.2016.06.004","volume":"71","author":"P Gandotra","year":"2016","unstructured":"Gandotra, P., Jha, R.: Device-to-device communication in cellular networks: a survey. J. Netw. Comput. Appl. 71, 99\u2013117 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"620_CR3","doi-asserted-by":"publisher","first-page":"4232","DOI":"10.1109\/JSYST.2020.2979044","volume":"14","author":"I Ioannou","year":"2020","unstructured":"Ioannou, I., Vassiliou, V., Christophorou, C., Pitsillides, A.: Distributed artificial intelligence solution for D2D communication in 5G networks. IEEE Syst. J. 14(3), 4232\u20134241 (2020)","journal-title":"IEEE Syst. J."},{"key":"620_CR4","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.jnca.2017.03.017","volume":"93","author":"M Ahmad","year":"2017","unstructured":"Ahmad, M., Azam, M., Naeem, M., Iqbal, M., Anpalagan, A., Haneef, M.: Resource management in D2D communication: an optimisation perspective. J. Netw. Comput. Appl. 93, 51\u201375 (2017). https:\/\/doi.org\/10.1016\/j.jnca.2017.03.017","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"620_CR5","doi-asserted-by":"publisher","first-page":"1054","DOI":"10.1109\/COMST.2017.2649687","volume":"19","author":"M Haus","year":"2017","unstructured":"Haus, M., Waqas, M., Ding, A., Li, Y., Tarkoma, S., Ott, J.: Security and privacy in device-to-device (D2D) communication: a review. IEEE Commun. Surv. Tutor. 19(2), 1054\u20131079 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"620_CR6","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.jnca.2016.11.002","volume":"78","author":"P Gandotra","year":"2017","unstructured":"Gandotra, P., Kumar Jha, R., Jain, S.: A survey on device-to-device (D2D) communication: architecture and security issues. J. Netw. Comput. Appl. 78, 9\u201329 (2017). https:\/\/doi.org\/10.1016\/j.jnca.2016.11.002","journal-title":"J. Netw. Comput. Appl."},{"key":"620_CR7","doi-asserted-by":"crossref","unstructured":"Modares, H., Moravejosharieh, A., Salleh, R.: Wireless network security using elliptic curve cryptography. In: First International Conference on Informatics and Computational Intelligence, pp. 348\u2013351 (2011)","DOI":"10.1109\/ICI.2011.63"},{"key":"620_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78636-8","volume-title":"Operational Semantics and Verification of Security Protocols (Information Security and Cryptography)","author":"C Cremers","year":"2012","unstructured":"Cremers, C., Mauw, S.: Operational Semantics and Verification of Security Protocols (Information Security and Cryptography), 2012th edn. Springer, Cham (2012)","edition":"2012"},{"issue":"1","key":"620_CR9","doi-asserted-by":"publisher","first-page":"217","DOI":"10.3390\/app10010217","volume":"10","author":"B Seok","year":"2019","unstructured":"Seok, B., Sicato, J., Erzhena, T., Xuan, C., Pan, Y., Park, J.: Secure D2D communication for 5G IoT network based on lightweight cryptography. Appl. Sci. 10(1), 217 (2019)","journal-title":"Appl. Sci."},{"key":"620_CR10","doi-asserted-by":"crossref","unstructured":"Mohseni-Ejiyeh, A., Ashouri-Talouki, M., Mahdavi, M.: A lightweight and secure data sharing protocol for D2D communications. In: 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), vol. 6\u20137, pp. 1\u20136 (2017)","DOI":"10.1109\/ISCISC.2017.8488337"},{"issue":"5","key":"620_CR11","doi-asserted-by":"publisher","first-page":"791","DOI":"10.4218\/etrij.11.0110.0665","volume":"33","author":"K Rajendiran","year":"2011","unstructured":"Rajendiran, K., Shankararajan, R., Palaniappan, R.: A secure key predistribution scheme for WSN using elliptic curve cryptography. ETRI J. 33(5), 791\u2013801 (2011)","journal-title":"ETRI J."},{"issue":"11","key":"620_CR12","doi-asserted-by":"publisher","first-page":"7021","DOI":"10.1109\/TWC.2020.3007702","volume":"19","author":"Z Shang","year":"2020","unstructured":"Shang, Z., Ma, M., Li, X.: A secure group-oriented device-to-device authentication protocol for 5G wireless networks. IEEE Trans. Wirel. Commun. 19(11), 7021\u20137032 (2020)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"620_CR13","doi-asserted-by":"crossref","unstructured":"Steri, G., Baldini, G., Fovino, I., Neisse, R., Goratti, L.: A novel multi-hop secure LTE-D2D communication protocol for IoT scenarios. In: 23rd International Conference on Telecommunications (ICT), pp. 1\u20136 (2016)","DOI":"10.1109\/ICT.2016.7500356"},{"issue":"8","key":"620_CR14","doi-asserted-by":"publisher","first-page":"3637","DOI":"10.1109\/TII.2017.2778090","volume":"14","author":"M Wang","year":"2017","unstructured":"Wang, M., Yan, Z.: Privacy-preserving authentication and key agreement protocols for D2D group communications. IEEE Trans. Ind. Inform. 14(8), 3637\u20133647 (2017)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"4","key":"620_CR15","doi-asserted-by":"publisher","first-page":"2659","DOI":"10.1109\/TVT.2015.2416002","volume":"65","author":"A Zhang","year":"2016","unstructured":"Zhang, A., Chen, J., Hu, R., Qian, Y.: SeDS: secure data sharing strategy for D2D communication in LTE-advanced networks. IEEE Trans. Veh. Technol. 65(4), 2659\u20132672 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"620_CR16","doi-asserted-by":"crossref","unstructured":"Chang, Q., Zhang, Y., Qin, L.: A node authentication protocol based on ECC in WSN. In: International conference on computer design and applications, vol. 2, pp. 606\u2013609 (2010)","DOI":"10.1109\/ICCDA.2010.5541288"},{"key":"620_CR17","doi-asserted-by":"crossref","unstructured":"Shang, Z., Ma, M., Li, X.: A Certificateless authentication protocol for D2D group communications in 5G cellular networks. In: IEEE Global Communications Conference (GLOBECOM), pp. 1\u20137 (2019)","DOI":"10.1109\/GLOBECOM38437.2019.9014047"},{"key":"620_CR18","doi-asserted-by":"crossref","unstructured":"Goratti, L., Steri, G., Gomez, K., Baldini, G.: Connectivity and security in a D2D communication protocol for public safety applications. In: 11th International Symposium on Wireless Communications Systems (ISWCS), pp. 548\u20135524 (2014)","DOI":"10.1109\/ISWCS.2014.6933414"},{"issue":"1","key":"620_CR19","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1049\/iet-net.2017.0119","volume":"7","author":"O Nait Hamoud","year":"2018","unstructured":"Nait Hamoud, O., Kenaza, T., Challal, Y.: Security in device-to-device communications: a survey. IET Netw. 7(1), 14\u201322 (2018). https:\/\/doi.org\/10.1049\/iet-net.2017.0119","journal-title":"IET Netw."},{"key":"620_CR20","volume-title":"Cryptography and Network Security: Principles and Practices","author":"W Stallings","year":"2005","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practices, 4th edn. Prentice Hall, New York (2005)","edition":"4"},{"key":"620_CR21","volume-title":"RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations","author":"Y Zhang","year":"2010","unstructured":"Zhang, Y., Yang, L.T., Chen, J.: RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations. Taylor & Francis, Cambridge (2010)"},{"key":"620_CR22","doi-asserted-by":"crossref","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: International Workshop on Cryptographic Hardware and Embedded Systems\u2014CHES 2004, pp. 119\u2013132 (2004)","DOI":"10.1007\/978-3-540-28632-5_9"},{"key":"620_CR23","doi-asserted-by":"crossref","unstructured":"Khajuria, S., Tange, H.: Implementation of Diffie-Hellman key exchange on wireless sensor using elliptic curve cryptography. In: 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, pp. 772\u2013776 (2009)","DOI":"10.1109\/WIRELESSVITAE.2009.5172547"},{"key":"620_CR24","unstructured":"Malan, D., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: Proceedings of 1st IEEE International Conference Communications and Networks (SECON), Santa Clara, CA (2004)"},{"key":"620_CR25","volume-title":"Cryptography and Network Security: Principles and Practice","author":"W Stallings","year":"2002","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practice, 3rd edn. Prentice Hall, New York (2002)","edition":"3"},{"key":"620_CR26","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MCOM.2014.6815897","volume":"52","author":"MN Tehrani","year":"2014","unstructured":"Tehrani, M.N., Uysal, M., Yanikomeroglu, H.: Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Commun. Mag. 52, 86\u201392 (2014)","journal-title":"IEEE Commun. Mag."},{"key":"620_CR27","unstructured":"A.E.T.Europe B.V..: The difference between a digital signature and digital certificate. AET Europe. 14-06-2017. https:\/\/www.aeteurope.com\/news\/digital-signature-digital-certificate\/ (2017)"},{"key":"620_CR28","unstructured":"Specification 23.303. (n.d.). Retrieved June 23, 2022, https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=840"},{"key":"620_CR29","unstructured":"ProSe (Proximity Services) for LTE & 5G Networks: 2017\u20132030\u2014opportunities, challenges, strategies & forecasts. (n.d.). Retrieved June 23, 2022, https:\/\/www.prnewswire.com\/news-releases\/prose-proximity-services-for-lte--5g-networks-2017-2030---opportunities-challenges-strategies--forecasts-300396915.html"},{"key":"620_CR30","doi-asserted-by":"publisher","unstructured":"Burnett, S., Paine, S.: RSA security\u2019s official guide to cryptography. 419. RSA security\u2019s official guide to cryptography | Guide books. (n.d.). Retrieved June 23, 2022, from https:\/\/doi.org\/10.5555\/381136 (2001)","DOI":"10.5555\/381136"},{"key":"620_CR31","unstructured":"Burnett, S., Paine, S.: RSA security\u2019s official guide to cryptography. 419 (2001)"},{"key":"620_CR32","volume-title":"Meta-analytics, Consensus Approaches and System Patterns for Data Analysis","author":"S Simske","year":"2019","unstructured":"Simske, S.: Meta-analytics, Consensus Approaches and System Patterns for Data Analysis. Morgan Kaufmann (2019)"},{"key":"620_CR33","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/769\/1\/012061","author":"WA Hammood","year":"2020","unstructured":"Hammood, W.A., Abdullah, R., Hammood, O.A., Mohamad Asmara, S., Al-Sharafi, M.A., Muttaleb Hasan, A.: A review of user authentication model for online banking system based on mobile IMEI number. IOP Conf. Ser. Mater. Sci. Eng. (2020). https:\/\/doi.org\/10.1088\/1757-899X\/769\/1\/012061","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"issue":"5","key":"620_CR34","doi-asserted-by":"publisher","first-page":"2007","DOI":"10.1109\/TIT.2008.920224","volume":"54","author":"R Dutta","year":"2008","unstructured":"Dutta, R., Barua, R.: Provably secure constant round contributory group key agreement in dynamic setting. IEEE Trans. Inf. Theory 54(5), 2007\u20132025 (2008). https:\/\/doi.org\/10.1109\/TIT.2008.920224","journal-title":"IEEE Trans. Inf. Theory"},{"key":"620_CR35","unstructured":"Lindenberg, C., Wirt, K., Buchmann, J.A.: Formal proof for the correctness of RSA-PSS. IACR Cryptology EPrint Archive, 2006, 11. http:\/\/dblp.uni-trier.de\/db\/journals\/iacr\/iacr2006.html#LindenbergWB06(2006)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00620-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-022-00620-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00620-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,5]],"date-time":"2024-10-05T05:43:47Z","timestamp":1728107027000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-022-00620-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,4]]},"references-count":35,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["620"],"URL":"https:\/\/doi.org\/10.1007\/s10207-022-00620-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2022,10,4]]},"assertion":[{"value":"4 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no potential competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"All authors consent for publication.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}}]}}