Enhancing Security and Privacy in 5G Device-to-Device Communication: A Secure Gale-Shapley Algorithm Approach
Device-to-Device (D2D) communication is pivotal in enhancing the performance of 5G networks by improving spectral efficiency, reducing latency, and supporting applications such as the Internet of Things (IoT). Despite these benefits, direct communication pathways in D2D pose significant security and...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2025-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10879286/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850189855039946752 |
|---|---|
| author | Musaad Alruwaili Junghwan Kim Jared Oluoch |
| author_facet | Musaad Alruwaili Junghwan Kim Jared Oluoch |
| author_sort | Musaad Alruwaili |
| collection | DOAJ |
| description | Device-to-Device (D2D) communication is pivotal in enhancing the performance of 5G networks by improving spectral efficiency, reducing latency, and supporting applications such as the Internet of Things (IoT). Despite these benefits, direct communication pathways in D2D pose significant security and privacy challenges, such as unauthorized access, data eavesdropping, and privacy breaches. To address these issues, we propose a robust and adaptive security framework that integrates AI-enhanced physical layer key generation, full-duplex adaptive jamming, and differential privacy. Our approach employs secure multi-party computation (MPC) and lightweight encryption to protect user preferences and communication data during resource allocation while ensuring optimal system performance. AI-driven key generation dynamically adapts to changing network conditions, whereas the full-duplex adaptive jamming mechanism effectively counteracts eavesdropping threats. We validated the framework through extensive MATLAB simulations, demonstrating its ability to achieve high throughput and low latency, even in the presence of various security threats. The results confirm the efficacy of the framework in safeguarding D2D communications, making it well suited for mission-critical 5G applications, where both performance and security are paramount. |
| format | Article |
| id | doaj-art-ff9d2f6b4d8441959b0884fcc8fb45d7 |
| institution | OA Journals |
| issn | 2169-3536 |
| language | English |
| publishDate | 2025-01-01 |
| publisher | IEEE |
| record_format | Article |
| series | IEEE Access |
| spelling | doaj-art-ff9d2f6b4d8441959b0884fcc8fb45d72025-08-20T02:15:30ZengIEEEIEEE Access2169-35362025-01-0113306233063510.1109/ACCESS.2025.354074510879286Enhancing Security and Privacy in 5G Device-to-Device Communication: A Secure Gale-Shapley Algorithm ApproachMusaad Alruwaili0https://orcid.org/0009-0002-3169-6592Junghwan Kim1https://orcid.org/0000-0001-7313-1552Jared Oluoch2https://orcid.org/0000-0002-9840-8180College of Engineering, University of Toledo, Toledo, OH, USACollege of Engineering, University of Toledo, Toledo, OH, USACollege of Engineering, University of Toledo, Toledo, OH, USADevice-to-Device (D2D) communication is pivotal in enhancing the performance of 5G networks by improving spectral efficiency, reducing latency, and supporting applications such as the Internet of Things (IoT). Despite these benefits, direct communication pathways in D2D pose significant security and privacy challenges, such as unauthorized access, data eavesdropping, and privacy breaches. To address these issues, we propose a robust and adaptive security framework that integrates AI-enhanced physical layer key generation, full-duplex adaptive jamming, and differential privacy. Our approach employs secure multi-party computation (MPC) and lightweight encryption to protect user preferences and communication data during resource allocation while ensuring optimal system performance. AI-driven key generation dynamically adapts to changing network conditions, whereas the full-duplex adaptive jamming mechanism effectively counteracts eavesdropping threats. We validated the framework through extensive MATLAB simulations, demonstrating its ability to achieve high throughput and low latency, even in the presence of various security threats. The results confirm the efficacy of the framework in safeguarding D2D communications, making it well suited for mission-critical 5G applications, where both performance and security are paramount.https://ieeexplore.ieee.org/document/10879286/5G networksdevice-to-device communication (D2D)security frameworkadaptive jammingAI-driven threat detectionphysical layer security |
| spellingShingle | Musaad Alruwaili Junghwan Kim Jared Oluoch Enhancing Security and Privacy in 5G Device-to-Device Communication: A Secure Gale-Shapley Algorithm Approach IEEE Access 5G networks device-to-device communication (D2D) security framework adaptive jamming AI-driven threat detection physical layer security |
| title | Enhancing Security and Privacy in 5G Device-to-Device Communication: A Secure Gale-Shapley Algorithm Approach |
| title_full | Enhancing Security and Privacy in 5G Device-to-Device Communication: A Secure Gale-Shapley Algorithm Approach |
| title_fullStr | Enhancing Security and Privacy in 5G Device-to-Device Communication: A Secure Gale-Shapley Algorithm Approach |
| title_full_unstemmed | Enhancing Security and Privacy in 5G Device-to-Device Communication: A Secure Gale-Shapley Algorithm Approach |
| title_short | Enhancing Security and Privacy in 5G Device-to-Device Communication: A Secure Gale-Shapley Algorithm Approach |
| title_sort | enhancing security and privacy in 5g device to device communication a secure gale shapley algorithm approach |
| topic | 5G networks device-to-device communication (D2D) security framework adaptive jamming AI-driven threat detection physical layer security |
| url | https://ieeexplore.ieee.org/document/10879286/ |
| work_keys_str_mv | AT musaadalruwaili enhancingsecurityandprivacyin5gdevicetodevicecommunicationasecuregaleshapleyalgorithmapproach AT junghwankim enhancingsecurityandprivacyin5gdevicetodevicecommunicationasecuregaleshapleyalgorithmapproach AT jaredoluoch enhancingsecurityandprivacyin5gdevicetodevicecommunicationasecuregaleshapleyalgorithmapproach |