IJCNIS Vol. 18, No. 2, 8 Apr. 2026
Cover page and Table of Contents: PDF (size: 856KB)
PDF (856KB), PP.181-195
Views: 0 Downloads: 0
D2D, VANET, Signcryption, Key Agreement, 5G Networks, Security, Privacy
Device-to-Device (D2D) communications in 5G enabled vanet Networks offer significant advantages in terms of improved communication efficiency and reduced latency. However, ensuring secure and efficient key agreement among devices remains a critical challenge. In this study, we present a novel lightweight framework for D2D communications that addresses these concerns by employing a Signcryption-based key agreement scheme [1]. The proposed scheme is built on the foundation of Diffie-Hellman Hyper Elliptic Curve Cryptography and leverages two one-way cryptographic hash functions to enhance security. By integrating the signcryption technique, our framework achieves a seamless combination of encryption and signing [2], reducing computational overhead and conserving network resources in resource-constrained 5G-enabled devices. Furthermore, we prioritize user location privacy in our framework by employing advanced techniques, including the Chinese Remainder Theorem. This ensures that location information is protected and not exposed to unauthorized parties during D2D communication sessions. Through extensive simulations and performance evaluations using ns3, we demonstrate the effectiveness and efficiency of our proposed key agreement scheme for D2D communications in 5G enabled vanet Networks. The results show improved communication performance and reduced resource consumption, making our framework a promising solution for secure and efficient D2D interactions in the context of evolving 5G networks.
Chinnam S. V. Maruthi Rao, Rama Krishna Akella, "A Lightweight Framework Using Signcryption Based Key Agreement Scheme with Location Privacy for D2D Communications in 5G VANETs", International Journal of Computer Network and Information Security(IJCNIS), Vol.18, No.2, pp.181-195, 2026. DOI:10.5815/ijcnis.2026.02.10
[1]Zheng, Y., 1997. Digital signcryption or how to achieve cost (signature & encryption)≪ cost (signature)+ cost (encryption). In Advances in Cryptology—CRYPTO'97: 17th Annual International Cryptology Conference Santa Barbara, California, USA August 17–21, 1997 Proceedings 17 (pp. 165-179). Springer Berlin Heidelberg.
[2]Zheng, Y. and Imai, H., 1998. How to construct efficient signcryption schemes on elliptic curves. Information processing letters, 68(5), pp.227-233.
[3]Kim, R.H. and Youm, H.Y., 2006, November. Secure authenticated key exchange protocol based on EC using signcryption scheme. In 2006 International Conference on Hybrid Information Technology (Vol. 2, pp. 74-79). IEEE.
[4]Singh, A.K., Solanki, A., Nayyar, A. and Qureshi, B., 2020. Elliptic curve signcryption-based mutual authentication protocol for smart cards. Applied Sciences, 10(22), p.8291.
[5]Mailloux, N., Miri, A. and Nevins, M., 2013. COMPASS: Authenticated group key agreement from signcryption. In Foundations and Practice of Security: 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers 5 (pp. 95-114). Springer Berlin Heidelberg.
[6]Gayathri, M. and Gomathy, C., 2024. Design of CSKAS-VANET model for stable clustering and authentication scheme using RBMA and signcryption. Frontiers in Computer Science, 6, p.1384515.
[7]Liang, Y., Yan, H. and Liu, Y., 2023. Unlinkable Signcryption Scheme for Multi-Receiver in VANETs. IEEE Transactions on Intelligent Transportation Systems, 24(9), pp.10138-10154.
[8]Zhou, Y., Tan, H. and Iroshan, K.C.A.A., 2023. A secure authentication and key agreement scheme with dynamic management for vehicular networks. Connection Science, 35(1), p.2176825.
[9]Khan, M.A., Ullah, I., Nisar, S., Noor, F., Qureshi, I.M., Khanzada, F.U. and Amin, N.U., 2020. An efficient and provably secure certificateless key-encapsulated signcryption scheme for flying ad-hoc network. IEEE Access, 8, pp.36807-36828.
[10]Wang, P., Chen, C.M., Kumari, S., Shojafar, M., Tafazolli, R. and Liu, Y.N., 2020. HDMA: Hybrid D2D message authentication scheme for 5G-enabled VANETs. IEEE Transactions on Intelligent Transportation Systems, 22(8), pp.5071-5080.
[11]Miao, J., Wang, Z., Miao, X. and Xing, L., 2021. A secure and efficient lightweight vehicle group authentication protocol in 5G networks. Wireless Communications and Mobile Computing, 2021(1), p.4079092.
[12]Al-Shareeda, M.A., Manickam, S., Mohammed, B.A., Al-Mekhlafi, Z.G., Qtaish, A., Alzahrani, A.J., Alshammari, G., Sallam, A.A. and Almekhlafi, K., 2022. Provably secure with efficient data sharing scheme for fifth-generation (5G)-enabled vehicular networks without road-side unit (RSU). Sustainability, 14(16), p.9961.
[13]Cui, B., Wei, L. and He, W., 2022. A new certificateless signcryption scheme for securing internet of vehicles in the 5G era. Security and Communication Networks, 2022(1), p.3214913.
[14]Ullah, I., Khan, M.A., Alsharif, M.H. and Nordin, R., 2021. An anonymous certificateless signcryption scheme for secure and efficient deployment of Internet of vehicles. Sustainability, 13(19), p.10891.
[15]Almazroi, A.A., Aldhahri, E.A., Al-Shareeda, M.A. and Manickam, S., 2023. ECA-VFog: An efficient certificateless authentication scheme for 5G-assisted vehicular fog computing. Plos one, 18(6), p.e0287291.
[16]Chow, M.C. and Ma, M., 2021. A lightweight traceable D2D authentication and key agreement scheme in 5G cellular networks. Computers and Electrical Engineering, 95, p.107375.
[17]Su, J., Ren, R., Li, Y., Lau, R.Y. and Shi, Y., 2022. Trusted Blockchain‐Based Signcryption Protocol and Data Management for Authentication and Authorization in VANETs. Wireless Communications and Mobile Computing, 2022(1), p.9572992.
[18]Karati, A. and Biswas, G.P., 2016, September. A practical identity based signcryption scheme from bilinear pairing. In 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 832-836). IEEE.
[19]Ali, U., Idris, M.Y.I., Frnda, J., Ayub, M.N.B., Alroobaea, R., Almansour, F., Shagari, N.M., Ullah, I. and Ali, I., 2022. Hyper elliptic curve based certificateless signcryption scheme for secure IIoT communications. CMC-Comput. Mater. Contin, 71, pp.2515-2532.
[20]Devarajan, M. and Sasikaladevi, N., 2020. An hyper elliptic curve based efficient signcryption scheme for user authentication. Journal of Intelligent & Fuzzy Systems, 39(6), pp.8487-8498.
[21]Zhang, J., Cui, J., Zhong, H., Chen, Z. and Liu, L., 2019. PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks. IEEE Transactions on Dependable and Secure Computing, 18(2), pp.722-735.
[22]Mallissery, S., Pai, M.M., Mehbadi, M., Pai, R.M. and Wu, Y.S., 2019. Online and offline communication architecture for vehicular ad-hoc networks using NS3 and SUMO simulators. Journal of High Speed Networks, 25(3), pp.253-271.