Research on Secure D2D Communication using Lightweight Cryptographic Techniques
Ajith Kumar V1, K Satyanarayan Reddy2

1Ajith Kumar V, Research Scholar, Department of Computer Applications, Regional Research Centre, VTU Belguam (Karnataka), India.
2Dr. K Satyanarayan Reddy, Professor, Department of ISE, Cambridge Institute of Technology Affiliated to VTU Belgaum, Bangalore (Karnataka), India.
Manuscript received on 05 June 2019 | Revised Manuscript received on 30 June 2019 | Manuscript Published on 04 July 2019 | PP: 667-675 | Volume-8 Issue-1S4 June 2019 | Retrieval Number: A11230681S419/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Outgrowth of wireless mobile communication lead to new revolution. Smart phones are making inroads into socio economic realms. Today we use smart phones almost like a personal computer. Some important milestones have been witnessed, such as number of fixed line Telephone connection has been surpassed by number of mobile phone connection, Number of connected/IP enabled devices in home surpassed more than one per person. In nutshell, people are living in a connected world, trying to connect unconnected things. Devices are becoming intelligent, smart and connected. Need for Device to Device communication is growing every day. D2D communication is becoming popular in health care , disaster or emergency services, power grid and lot many. Security cannot be undermined as D2D communication is becoming pivotal and impacting larger part of our life. In this paper our focus is on security challenges in D2D communication and explore remediation with lightweight cryptography. In this paper an effort has been made to study various techniques for securing D2D communication. This paper focuses on securing D2D communication using lightweight cryptographic algorithms.
Keywords: D2D Communication, Federal Information Processing Standard, Lightweight Cryptography, National Institute of Standards and Technology, User Equipment.
Scope of the Article: 6G Communication