Open Access Open Access  Restricted Access Subscription Access

Cryptography of 5th Generation Network Security Attacks in D2D Communication: A Review

Sohail Ahmad


Cryptography is the science for hiding the secret information. Cryptography is a technique/method that allows data to be sent in a secret and a secure form. In the present era, 5G technology is the most prominent technology in the network domain. However, it was said to be available in 2020, but still there are many views of expected features, benefits, and threats in 5G. 5G is a promising technology that will help in higher connectivity and D2D communication. It will improve all existing technologies. We can expect that in future, 5G technology will face some challenges in terms of security attacks and privacy issues. D2D communication is one of the key components of 5G. In this study, the researcher describes the security attacks of 5G which commonly occur in Device-to-Device communication. Security attacks must be there in all kinds of communication, especially when it comes to a wireless communication. This study is based on the review of current work which has addressed the challenges of 5G technology and security attacks in D2D communication.


Device to device, man in the middle, denial of service, cryptography, generations, security

Full Text:



Mane RR. A Review on Cryptography Algorithms, Attacks and encryption tool. Int J Innov Res Comput Commun Eng. 2015; 3(9): 8509–8514.

Shivani Desai, Yamini Rathod. (Nirma University, India). Analysis of Cryptography Techniques. International Journal of Computer Science & Communications (IJCSC). 2014; 5(1): 61–62.

Khan AS, Yasir Javed, et al. (Network Security Research Group Faculty of Computer Science and Information Technology University of Malaysia Sarawak). Security issues in 5G device to device communication. International Journal of Computer Science and Network Security (IJCSNS). 2017; 17(5): 366–375.

Mohamed Amine Ferrag, et al. (Department of Computer Science, Guelma University, Algeria). Security for 4G and 5G cellular network: A survey of existing authentication and privacy-preserving schemes. J Netw Comput Appl. 2018; 101: 55–82.

Fang D, Qian Y, Hu RQ. Security for 5G mobile wireless networks. IEEE Access. 2017 Dec 4;6:4850-74. doi: 10.1109/ACCESS.2017.2779146.

Mannweiler C, Breitbach M, Droste H, Pavón IL, Ucar I, Schneider P, Doll M, Sanchez JR. 5G NORMA: System architecture for programmable & multi-tenant 5G mobile networks. 2017 European Conference on Networks and Communications (EuCNC). Oulu, Finland. 2017, Jun 12–15. DOI: 10.1109/EuCNC.2017.7980662.

Elander M, Gunnarsson P. Generating an information security classification model for satellite imagery and geographical information. [Master’s Thesis]. Department of Computer and Information Science, Linköping University, Linköping, Sweden; 2022.

Khan R, Kumar P, Jayakody DN, Liyanage M. A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions. IEEE Communications Surveys & Tutorials. 2019 Aug 8;22(1):196-248.

Panhwar MA, SullemanMemon M, Saddar S, Rajput U. 5G future technology: Research challenges for an emerging wireless networks. Int. J. Comput. Sci. Netw. Secur. 2017 Dec 30;17(12):201-6.

Ji X, Huang K, Jin L, Tang H, Liu C, Zhong Z, You W, Xu X, Zhao H, Wu J, Yi M. Overview of 5G security technology. Science China Information Sciences. 2018 Aug;61(8):081301.

Farroha BS, Farroha DL, Cook JD, Dutta A. Exploring the security and operational aspects of the 5th generation wireless communication system. InOpen Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2019 2019 Apr 30 (Vol. 11015, pp. 60-79). SPIE.

Yadav R, Sanyal S. Secure D2D communication in 5G networks. InLecture Notes in Engineering and Computer Science: Proceedings of the World Congress on Engineering 2018 (pp. 403-408).

Tian Z, Sun Y, Su S, Li M, Du X, Guizani M. Automated attack and defense framework for 5G security on physical and logical layers. arXiv preprint arXiv:1902.04009. 2019 Feb 11.

Millar G, Kafchitsas A, Kourtis A, Xilouris G, Christopoulou M, Kolometsos S, de Oca EM, MI HN, Pastor A, Fernandez S, TID DL. Intelligent security and pervasive trust for 5G and beyond. Eur. Commission, Germany, Tech. Rep. H2020-EU. 2019;2(1).

Fonyi S. Overview of 5G security and vulnerabilities. The Cyber Defense Review. 2020 Apr 1;5(1):117-34.

Gupta A, Jha RK, Devi R. Security architecture of 5g wireless communication network. International Journal of Sensors Wireless Communications and Control. 2018 Aug 1;8(2):92-9.

Srivastava S, Malik H, Sharma R. Special issue on intelligent tools and techniques for signals, machines and automation. Journal of Intelligent & Fuzzy Systems. 2018 Jan 1;35(5):4895-9.

Alquhayz H, Alalwan N, Alzahrani AI, Al-Bayatti AH, Sharif MS. Policy-based security management system for 5G heterogeneous networks. Wireless Communications and Mobile Computing. 2019 Nov 14;2019:1-4.

Zhang X, Kunz A, Schröder S. Overview of 5G security in 3GPP. 2017 IEEE Conference on Standards for Communications and Networking (CSCN), Helsinki, Finland, 2017. p. 181-6. doi: 10.1109/CSCN.2017.8088619.

Chiani M, Paolini E, Callegati F. Open issues and beyond 5G. 5G Italy White eBook: from Research to Market. 2018 Nov:01-11.

Borgaonkar R, Hirschi L, Park S, Shaik A. New privacy threat on 3G, 4G, and upcoming 5G AKA protocols. Cryptology ePrint Archive. 2018.

Atapoor S. Security for 4G and 5G cellular networks. InReport for the Course Research Seminar in Cryptography (MTAT. 07.022), Institute of Computer Science, University of Tartu 2018 Jun 20. .

Arfaoui G, Bisson P, Blom R, Borgaonkar R, Englund H, Félix E, Klaedtke F, Nakarmi PK, Näslund M, O’Hanlon P, Papay J. A security architecture for 5G networks. IEEE access. 2018 Apr 17;6:22466-79.

Bertino E, Hussain SR, Chowdhury O. 5g security and privacy: A research roadmap. arXiv preprint arXiv:2003.13604. 2020 Mar 30. 25. Gandotra P, Jha RK. Device-to-device communication in cellular networks: A survey. Journal of Network and Computer Applications. 2016 Aug 1;71:99-117.

Yarali A, Yedla R, Almalki S, Covey K, Almohana M. Security, privacy & trust in 5g wireless mobile communications. In5G mobile: From research and innovations to deployment aspects 2017 (pp. 147-162). Nova Science Publishers, Inc.

Ferrag MA, Maglaras L, Argyriou A, Kosmanos D, Janicke H. Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes. Journal of Network and Computer Applications. 2018 Jan 1;101:55-82.

Celik A, Tetzner J, Sinha K, Matta J. 5G device-to-device communication security and multipath routing solutions. Applied Network Science. 2019 Dec;4:1-24.

Yan Z, Xie H, Zhang P, Gupta BB. Flexible data access control in D2D communications. Future generation computer systems. 2018 May 1;82:738-51.

Nait Hamoud O, Kenaza T, Challal Y. Security in device‐to‐device communications: a survey. IET Networks. 2018 Jan;7(1):14-22.

Iannacci J. The future 5th generation (5G) of mobile networks: Challenges and opportunities of an impelling scenario. RF-MEMS Technology for High-Performance Passives: The challenge of 5G mobile applications. 2017 Nov 1.

Panhwar MA, SullemanMemon M, Saddar S, Rajput U. 5G future technology: Research challenges for an emerging wireless networks. Int. J. Comput. Sci. Netw. Secur. 2017 Dec 30;17(12):201-6.

Seok B, Sicato JC, Erzhena T, Xuan C, Pan Y, Park JH. Secure D2D communication for 5G IoT network based on lightweight cryptography. Applied Sciences. 2019 Dec 27;10(1):217.

Wang J, Li H, Guo F, Zhang W, Cui Y. D2D big data privacy-preserving framework based on (a, k)-anonymity model. Mathematical Problems in Engineering. 2019 Aug 7;2019.

Alnasser A, Sun H, Jiang J. Cyber security challenges and solutions for V2X communications: A survey. Computer Networks. 2019 Mar 14;151:52-67.

Samaila MG, Neto M, Fernandes DA, Freire MM, Inácio PR. Challenges of securing Internet of Things devices: A survey. Security and Privacy. 2018 Mar;1(2):e20.

Tehrani MN, Uysal M, Yanikomeroglu H. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Communications Magazine. 2014 May 19;52(5):86-92.

Huang JJ, Huang SC, Wu N, Yu D, Wang CK, Chen A, Klotzkin D, Jan YH, Chen C, Chen HS, Chou E. Original Paper High-reliability, High-performance 25 Gb/s Directly Modulated Uncooled Lasers for 5G Wireless Communications.

Haus M, Waqas M, Ding AY, Li Y, Tarkoma S, Ott J. Security and privacy in device-to-device (D2D) communication: A review. IEEE Communications Surveys & Tutorials. 2017 Jan 9;19(2):1054-79.

Ahmad I, Shahabuddin S, Kumar T, Okwuibe J, Gurtov A, Ylianttila M. Security for 5G and beyond. IEEE Communications Surveys & Tutorials. 2019 May 10;21(4):3682-722..

Lou W, Liu W, Zhang Y, Fang Y. SPREAD: improving network security by multipath routing in mobile ad hoc networks. Wirel Netw. 2009 Apr; 15(3): 279-94. doi: 10.1007/s11276-007-0039-4.

Mohammed Alqahtani. Denial of Service Attack on D2d Communication For 4g. International Journal of Electrical, Electronics and Data Communication (IJEEDC). 2017; 5(1):38-40.

Song L, Niyato D, Han Z, Hossain E. Wireless device-to-device communications and networks. Cambridge University Press; 2015 Mar 12.

Saravanan A, Bama SS. A review on cyber security and the fifth generation cyberattacks. Oriental journal of computer science and technology. 2019; 12(2): 50-6.

Rupprecht D, Dabrowski A, Holz T, Weippl E, Pöpper C. On security research towards future mobile network generations. IEEE Communications Surveys & Tutorials. 2018 Apr 2;20(3): 2518-42. (2023). ITN-SECRET (H2020-MSCA-ITN-2016-722424. Secure Network Coding for Reduced Energy next generation Mobile Small cells). D3.1 – Secure network coding for mobile small cells: survey and reference architecture. Documents download module. [online] Available from:

Ahmad I, Kumar T, Liyanage M, Okwuibe J, Ylianttila M, Gurtov A. 5G security: Analysis of threats and solutions. In2017 IEEE Conference on Standards for Communications and Networking (CSCN) 2017 Sep 18 (pp. 193-199). IEEE.

Yasir Javed, Adnan Shahid Khan. Major Security attacks in D2D Communication. Ubiquitous Computing and Communication Journal 2019;1(1).

Le NT, Hossain MA, Islam A, Kim DY, Choi YJ, Jang YM. Survey of promising technologies for 5G networks. Mobile information systems. 2016 Oct; 2016.


  • There are currently no refbacks.

Copyright (c) 2023 Journal of Communication Engineering & Systems