Smart City Gnosys

Smart city article details

Title A Secure Authentication And Optimization Based Device-To-Device Communication For 5G Enabled Iot Applications Of Smart Cities
ID_Doc 4467
Authors Rani T.P.; Maruthu A.; Ramakrishnan P.G.; Jayakumar C.
Year 2025
Published Wireless Networks, 31, 4
DOI http://dx.doi.org/10.1007/s11276-025-03930-6
Abstract Smart cities are designed by an interconnection of multiple Internet of Things devices for gathering data from objects and humans to process essential activities. However, it is a difficult task to handle the huge data inreal-time to propel smart city applications. Device to Device (D2D) communication must support authentication for secure and effective communication. Thus, a protocol namely Flamingo Search Aquila Optimization KeyGenerator (FSAO_KeyGen) is devised for efficient authentication in D2D devices. Here, D2D communications via Wi-Fi Direct are established using five various phases, such as (1) discovery, (2) Group Owner (GO) negotiation, (3) mutual authentication, (4) key agreement, and (5) address configuration. Initially, in the process of D2D communication, the devices are discovered in a discovery phase. After that, in a GO negotiation phase, the discovered devices negotiate with each other and the device which possesses a greater intent value wins the negotiation and becomes a GO. Thereafter, the devices generate the keys in a key generation phase. Here, the key is generated by using the proposed FSAO_KeyGen, where the proposed FASO_KeyGen is formed by the integration of Flamingo Search Algorithm and Aquila Optimizer for secure authentication in D2D communication. Moreover, the experimental outcome reveals that the FSAO_KeyGen processed efficiently attaining computation time, memory, and response time values of 1.212S, 7.791 MB, and 0.690S. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.
Author Keywords Aquila optimizer; Device to device communication; Flamingo search algorithm; Flamingo search aquila optimization; Group owner


Similar Articles


Id Similarity Authors Title Published
5866 View0.854Wang M.; Yan Z.; Song B.; Atiquzzaman M.Aaka-D2D: Anonymous Authentication And Key Agreement Protocol In D2D CommunicationsProceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019 (2019)