Enhancing Security and Privacy in 5G Device-to-Device Communication: A Secure Gale-Shapley Algorithm Approach

Device-to-Device (D2D) communication is pivotal in enhancing the performance of 5G networks by improving spectral efficiency, reducing latency, and supporting applications such as the Internet of Things (IoT). Despite these benefits, direct communication pathways in D2D pose significant security and...

Full description

Saved in:
Bibliographic Details
Main Authors: Musaad Alruwaili, Junghwan Kim, Jared Oluoch
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10879286/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850189855039946752
author Musaad Alruwaili
Junghwan Kim
Jared Oluoch
author_facet Musaad Alruwaili
Junghwan Kim
Jared Oluoch
author_sort Musaad Alruwaili
collection DOAJ
description Device-to-Device (D2D) communication is pivotal in enhancing the performance of 5G networks by improving spectral efficiency, reducing latency, and supporting applications such as the Internet of Things (IoT). Despite these benefits, direct communication pathways in D2D pose significant security and privacy challenges, such as unauthorized access, data eavesdropping, and privacy breaches. To address these issues, we propose a robust and adaptive security framework that integrates AI-enhanced physical layer key generation, full-duplex adaptive jamming, and differential privacy. Our approach employs secure multi-party computation (MPC) and lightweight encryption to protect user preferences and communication data during resource allocation while ensuring optimal system performance. AI-driven key generation dynamically adapts to changing network conditions, whereas the full-duplex adaptive jamming mechanism effectively counteracts eavesdropping threats. We validated the framework through extensive MATLAB simulations, demonstrating its ability to achieve high throughput and low latency, even in the presence of various security threats. The results confirm the efficacy of the framework in safeguarding D2D communications, making it well suited for mission-critical 5G applications, where both performance and security are paramount.
format Article
id doaj-art-ff9d2f6b4d8441959b0884fcc8fb45d7
institution OA Journals
issn 2169-3536
language English
publishDate 2025-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-ff9d2f6b4d8441959b0884fcc8fb45d72025-08-20T02:15:30ZengIEEEIEEE Access2169-35362025-01-0113306233063510.1109/ACCESS.2025.354074510879286Enhancing Security and Privacy in 5G Device-to-Device Communication: A Secure Gale-Shapley Algorithm ApproachMusaad Alruwaili0https://orcid.org/0009-0002-3169-6592Junghwan Kim1https://orcid.org/0000-0001-7313-1552Jared Oluoch2https://orcid.org/0000-0002-9840-8180College of Engineering, University of Toledo, Toledo, OH, USACollege of Engineering, University of Toledo, Toledo, OH, USACollege of Engineering, University of Toledo, Toledo, OH, USADevice-to-Device (D2D) communication is pivotal in enhancing the performance of 5G networks by improving spectral efficiency, reducing latency, and supporting applications such as the Internet of Things (IoT). Despite these benefits, direct communication pathways in D2D pose significant security and privacy challenges, such as unauthorized access, data eavesdropping, and privacy breaches. To address these issues, we propose a robust and adaptive security framework that integrates AI-enhanced physical layer key generation, full-duplex adaptive jamming, and differential privacy. Our approach employs secure multi-party computation (MPC) and lightweight encryption to protect user preferences and communication data during resource allocation while ensuring optimal system performance. AI-driven key generation dynamically adapts to changing network conditions, whereas the full-duplex adaptive jamming mechanism effectively counteracts eavesdropping threats. We validated the framework through extensive MATLAB simulations, demonstrating its ability to achieve high throughput and low latency, even in the presence of various security threats. The results confirm the efficacy of the framework in safeguarding D2D communications, making it well suited for mission-critical 5G applications, where both performance and security are paramount.https://ieeexplore.ieee.org/document/10879286/5G networksdevice-to-device communication (D2D)security frameworkadaptive jammingAI-driven threat detectionphysical layer security
spellingShingle Musaad Alruwaili
Junghwan Kim
Jared Oluoch
Enhancing Security and Privacy in 5G Device-to-Device Communication: A Secure Gale-Shapley Algorithm Approach
IEEE Access
5G networks
device-to-device communication (D2D)
security framework
adaptive jamming
AI-driven threat detection
physical layer security
title Enhancing Security and Privacy in 5G Device-to-Device Communication: A Secure Gale-Shapley Algorithm Approach
title_full Enhancing Security and Privacy in 5G Device-to-Device Communication: A Secure Gale-Shapley Algorithm Approach
title_fullStr Enhancing Security and Privacy in 5G Device-to-Device Communication: A Secure Gale-Shapley Algorithm Approach
title_full_unstemmed Enhancing Security and Privacy in 5G Device-to-Device Communication: A Secure Gale-Shapley Algorithm Approach
title_short Enhancing Security and Privacy in 5G Device-to-Device Communication: A Secure Gale-Shapley Algorithm Approach
title_sort enhancing security and privacy in 5g device to device communication a secure gale shapley algorithm approach
topic 5G networks
device-to-device communication (D2D)
security framework
adaptive jamming
AI-driven threat detection
physical layer security
url https://ieeexplore.ieee.org/document/10879286/
work_keys_str_mv AT musaadalruwaili enhancingsecurityandprivacyin5gdevicetodevicecommunicationasecuregaleshapleyalgorithmapproach
AT junghwankim enhancingsecurityandprivacyin5gdevicetodevicecommunicationasecuregaleshapleyalgorithmapproach
AT jaredoluoch enhancingsecurityandprivacyin5gdevicetodevicecommunicationasecuregaleshapleyalgorithmapproach