,kmo Secure Device to Device Communication for 5G Network Based on improved

: Communication between two devices (device to device) in network systems can be defined is immediate communication between two devices without crossing the Base Station. Moreover, in a mobile network device to device communication is upcoming communication for the coming generation mobile communication network (5G), 5G is relied upon to permit high network throughput, diminishing communication delays, diminish traffic load and energy consumption. Device to device communication is a core technology of 5G. Therefore, all network types’ security issues must be considered. To deal with the security issue in 5G network we propose an improved Advanced Encryption Standard (AES) with shift row and Mix Columns. The result indicates that the suggested improved AES is more significant than traditional AES.


Introduction
Communication between two devices (device to device) in network systems became identified as one of the most fundamental enabling technologies in 5G networks [1]; device to device communication has several benefits in mobile networks [2]. First of all, it can increase the exploration of every cell in a mobile network as a transmission platform for sending information to the device placed exterior of cell inclusion. Second, device to device communication assists with diminishing the energy utilization of the base station by conveying straightforwardly among devices. Ultimately, the performance of reutilizing the identical radiofrequency is enhanced. In device to device communication, the space among nodes is pretty lower as compared to the distance among devices and a base station. This indicates the conflict of radiofrequency lower in device to device communication strategy, and it facilitates transmitting the different data utilizing the same radiofrequency. Because of these benefits, the 5G also consist device to device communication technology. Nevertheless, in mobile network device to device communication has a few protection threats [3]. The device to device communication technique includes three strategies which are node detection; establish a connection, and transmitting data [4] [5]. For this procedure, due to the lack confirmation process for approving device integrity. When nodes deliver demand for establish a connection to transfer data, any other node responds by transmitting an acknowledgment message. In addition, device to device communication doesn't utilize cryptography for secrecy and message verification to prevent from unauthorized alteration in the conversation procedure. This implies the attacker is able to handle attacks, for example, eavesdropping, imitation, listening, location spoofing, and privacy sniffing. Additionally, technology in the internet of things is connected with the 5G network to handle their service requests. However, the internet of things' applications deals with multiple sensitive data, and the internet of things devices need restricted means [6] with regard to memory, accomplishment, and energy utilization. These functions of the internet of things make the previously mentioned security challenges more critical and difficult to deal with due to the fact usual safety solutions can't be applied or processed adequately. To address the security difficulties of device to device communication in the 5G internet of things' network, 5G require a protected device to device communication network that consists of a suitable authentication technique among devices. Lightweight cryptography algorithm can be appropriate remedies for covering properties-restrained devices.

Overview of AES
The cryptography Advanced Encryption Standard (AES) algorithm, additionally recognizable by name Rijndael, it's a cryptography algorithm for the encoding of digital data built up via the National Institute of Standards and Technology (NIST) in the U.S. government in 2001 [7]. The AES operates work on a 128-bit plaintext and use the identical key for encryption and decryption process. The AES algorithm is to replace the Data Encryption Standard (DES) algorithm of cryptography due to key length, DES short key length of 56-bits makes it too insecure for applications [8] and it is being surprisingly influential with inside the development of cryptography. Cryptography design for the AES is a symmetric block cipher; the key lengths of the AES are 128, 192, and 256-bit. The key length decides what number of rounds to be performed. The 128-bit key lengths apply 10-rounds, 192-bit apply 12-rounds, and 256-bit apply 14-rounds [9]. AES arithmetic's procedures are subtraction, addition, multiplication, and division, operations depend on key length. All rounds have four transformations individually: Sub Bytes, Shift Rows, Mix Column, and Add Round Key. All transformation requires 16-byte blocks, which should be in form 4 x 4 matrices and brings matrix output with the equivalent size.

SubBytes transformation
SubBytes transformation is the principal phase for beginning each round in AES encryption process. To execute this phase a non-linear S-box is required to replace a byte in the state to different byte based on confusion and diffusion Shannon's standards for cryptographic algorithm; this operation has significant purpose to achieve further security [9][11]. Such as if we take Hexa 40 in the AES state, it needs to exchange with Hexa FD in table 1. Which is FD generated from the crossing of row 2 and column 8. For the rest of the bytes of the state need to complete this operation.

ShiftRows Transformation
The second operation stage beyond the SubByte which carries out on the state is ShiftRow. Most important concept beyond this stage is to shift bytes of the state cyclically toward left in every single row except row number zero. During this technique, bytes in the row number zero stays and never perform any transposition. But in first row a single byte is moved circular toward left. Then in the second row two bytes are moved toward left and in the final row three bytes are moved toward left, then every row of the state moves consistently toward a particular offset. As illustrated in Equation 1. r s ,c = r s ,( c + shift( r, nb) ) % Nb for 0 < r < 4 and 0 ≤ c < Nb ………..

MixColumns Transformation
The next operation which is performing on the state is MixColumn. In this operation columns in the state are classed as polynomial over Galois field (GF), GF(2 8

AddRoundKey Transformation
AddRoundKey is the most critical phase in the AES algorithm, where every byte from the state is joined with the round key then applies bitwise Exclusive OR procedure as illustrated in formulae 4. The round key is produced from the key expansion procedure.

The design approach for AES algorithm
Based on the previous clarification, Shift Row which is a circular procedure executed on the state key array which began from the second row to the fourth row of the state, the execution time for each row shift operation is O(n), such circular procedure can be quicker with the utilize of array shift row mapping that has index and value which is assigned immediately to index of the key state which need to be putting, therefore the execution time for array shift mapping which is O(n) only one time will be executed.  Where i is an index and j is a value, these operations will decrease the circular movement procedure.
The MixColumns phase is the maximum calculation challenging phase in the AES algorithm and as a result, it wastes a maximum of the time required for required encryption and decryption process. Therefore, our second improvement is in the MixColumns technique transformation, the MixColumns phase is changed with an XOR procedure among the input state and random vector named IV. By using this XOR procedure can reduce the computing needs to 16-XOR rounds due to the input state has only 16-bytes and the XOR procedure waste one cycle for every byte to be performed.
Therefore, utilizing a minimal-cost hardware the total number of cycles could be accomplished that relies upon an 8-bit processor for execution of this plan. Regardless, this number of cycles could be enhanced if the encryption and decryption procedure is completed using hardware with better details. For instance, if the specific hardware relies upon a 32-bit processor, the complete cycle shall be decreased to just 4-cycles considering that 4-XOR procedures can be achieved using a single cycle.  This modification has two strategies for the second inputs of the XOR procedure. First, for the complete encryption and decryption procedure, it has a single IV vector. Second, for every cycle in the encryption and decryption procedure, also it has only a single IV vector. The first strategy will speed up the encryption process at the beginning of the encryption process when the second approach will add the security complication for the adjusted design.

Result and Discussion
The proposed AES algorithm with modified shift row and MixColumn operations is evaluated on five bytes' types of data. Notice that the outcomes were processed at Windows 10 device that has core i9 on a 2.8-GHz processor. Table 2, shows the comparison between Rijndael's AES algorithm with a modified AES algorithm, the table consists of two sections, the encryption section, and the decryption section. The table 3 indicates encryption and decryption time for the modified AES algorithm which is less than the existing AES algorithm.

Conclusion
In the near feature 5G network will be a fundamental element of our daily lives. Many sensors and energy-constrained devices will constantly be communicating with each other the security of which must not be agreed. Encryption is a form of cryptography, which is used to secure valuable data from criminal access or modification. AES is belonging to a popular algorithms applied for encryption. But AES algorithm encounters consuming useless time to accomplish the complicated requirement required for the encryption procedure mainly for the real-time application. A few improvements had completed on the AES algorithm to decrease the wasting time or to improve the complication of the algorithm. In this paper, to use AES in real-time applications a new improvement is practiced to the AES algorithm to adjust it. The improvements can grow the efficiency of the encryption and decryption techniques at the same time the difficulty of the encryption is highest possible.