Skip to main content
Erschienen in: Wireless Networks 8/2016

01.11.2016

CAKA: a novel certificateless-based cross-domain authenticated key agreement protocol for wireless mesh networks

verfasst von: Yanping Li, Weifeng Chen, Zhiping Cai, Yuguang Fang

Erschienen in: Wireless Networks | Ausgabe 8/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Due to the flexibility of wireless mesh networks (WMNs) to form the backhaul subnetworks, future generation networks may have to integrate various kinds of WMNs under possibly various administrative domains. Aiming at establishing secure access and communications among the communication entities in a multi-domain WMN environment, in this paper, we intend to address the cross-domain authentication and key agreement problem. We present a light-weight cross-domain authentication and key agreement protocol, namely CAKA, under certificateless-based public key cryptosystem. CAKA has a few attractive features. First, mutual authentication and key agreement between any pair of users from different WMN domains can be easily achieved with two-round interactions. Second, no central domain authentication server is required and fast authentication for various roaming scenarios is supported by using a repeated cross-domain algorithm. Third, no revocation and renewal of certificates and key escrow are needed. Finally, it provides relatively more security features without increasing too much overhead of computation and storage. Our analysis shows that the proposed CAKA protocol is highly efficient in terms of communication overhead and resilient to various kinds of attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhu, X., Fang, Y., & Wang, Y. (2010). How to secure multi-domain wireless mesh networks. Wireless Networks, 16(5), 1215–1222.CrossRef Zhu, X., Fang, Y., & Wang, Y. (2010). How to secure multi-domain wireless mesh networks. Wireless Networks, 16(5), 1215–1222.CrossRef
2.
Zurück zum Zitat Ren, K., & Lou, W. (2008). A sophisticated privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks. In The 28th international conference on distributed computing systems, 2008. ICDCS’08 (pp. 286–294). New York: IEEE. Ren, K., & Lou, W. (2008). A sophisticated privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks. In The 28th international conference on distributed computing systems, 2008. ICDCS’08 (pp. 286–294). New York: IEEE.
3.
Zurück zum Zitat Zhang, Y., & Fang, Y. (2006). ARSA: An attack-resilient security architecture for multihop wireless mesh networks. IEEE Journal on Selected Areas in Communications, 24(10), 1916–1928.MathSciNetCrossRef Zhang, Y., & Fang, Y. (2006). ARSA: An attack-resilient security architecture for multihop wireless mesh networks. IEEE Journal on Selected Areas in Communications, 24(10), 1916–1928.MathSciNetCrossRef
4.
Zurück zum Zitat Li, C., & Nguyen, U. T. (2010). Fast authentication for mobile clients in wireless mesh networks. In 2010 23rd Canadian conference on electrical and computer engineering (CCECE) (pp. 1–8). New York: IEEE. Li, C., & Nguyen, U. T. (2010). Fast authentication for mobile clients in wireless mesh networks. In 2010 23rd Canadian conference on electrical and computer engineering (CCECE) (pp. 1–8). New York: IEEE.
5.
Zurück zum Zitat Gao, T., Guo, N., & Yim, K. (2012). Delegation-based mutual authentication scheme for multi-operator wireless mesh network. In 2012 sixth international conference on innovative mobile and internet services in ubiquitous computing (IMIS) (pp. 143–147). New York: IEEE. Gao, T., Guo, N., & Yim, K. (2012). Delegation-based mutual authentication scheme for multi-operator wireless mesh network. In 2012 sixth international conference on innovative mobile and internet services in ubiquitous computing (IMIS) (pp. 143–147). New York: IEEE.
6.
Zurück zum Zitat Wong, F.L., & Lim, H.W. (2007). Identity-based and inter-domain password authenticated key exchange for lightweight clients. In 21st International conference on advanced information networking and applications workshops, AINAW’07 (vol. 1, pp. 544–550). New York: IEEE. Wong, F.L., & Lim, H.W. (2007). Identity-based and inter-domain password authenticated key exchange for lightweight clients. In 21st International conference on advanced information networking and applications workshops, AINAW’07 (vol. 1, pp. 544–550). New York: IEEE.
7.
Zurück zum Zitat Chen, L., Lim, H. W., & Yang, G. (2013). Cross-domain password-based authenticated key exchange revisited. In 2013 Proceedings IEEE INFOCOM (pp. 1052–1060). IEEE. Chen, L., Lim, H. W., & Yang, G. (2013). Cross-domain password-based authenticated key exchange revisited. In 2013 Proceedings IEEE INFOCOM (pp. 1052–1060). IEEE.
8.
Zurück zum Zitat He, B., Agrawal, D. P. (2010). An identity-based authentication and key establishment scheme for multi-operator maintained wireless mesh networks. In 2010 IEEE 7th international conference on mobile adhoc and sensor systems (MASS) (pp. 71–78). New York: IEEE. He, B., Agrawal, D. P. (2010). An identity-based authentication and key establishment scheme for multi-operator maintained wireless mesh networks. In 2010 IEEE 7th international conference on mobile adhoc and sensor systems (MASS) (pp. 71–78). New York: IEEE.
9.
Zurück zum Zitat Ren, K., Yu, S., Lou, W., & Zhang, Y. (2010). Peace: A novel privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks. IEEE Transactions on Parallel and Distributed Systems, 21(2), 203–215.CrossRef Ren, K., Yu, S., Lou, W., & Zhang, Y. (2010). Peace: A novel privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks. IEEE Transactions on Parallel and Distributed Systems, 21(2), 203–215.CrossRef
10.
Zurück zum Zitat Shim, K. (2003). Efficient ID-based authenticated key agreement protocol based on weil pairing. Electronics Letters, 39(8), 653–654.CrossRef Shim, K. (2003). Efficient ID-based authenticated key agreement protocol based on weil pairing. Electronics Letters, 39(8), 653–654.CrossRef
11.
Zurück zum Zitat Wang, S., Cao, Z., Choo, K.-K. R., & Wang, L. (2009). An improved identity-based key agreement protocol and its security proof. Information Sciences, 179(3), 307–318.MathSciNetCrossRefMATH Wang, S., Cao, Z., Choo, K.-K. R., & Wang, L. (2009). An improved identity-based key agreement protocol and its security proof. Information Sciences, 179(3), 307–318.MathSciNetCrossRefMATH
12.
Zurück zum Zitat Wang, S., Cao, Z., Cheng, Z., & Choo, K.-K. R. (2009). Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode. Science in China Series F: Information Sciences, 52(8), 1358–1370.MathSciNetCrossRefMATH Wang, S., Cao, Z., Cheng, Z., & Choo, K.-K. R. (2009). Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode. Science in China Series F: Information Sciences, 52(8), 1358–1370.MathSciNetCrossRefMATH
13.
Zurück zum Zitat I. C. S. L. M. S. Committee et al. (2009). Ieee p802.11s/d2.06: Part 11: Wireless lan medium access control (MAC) and physical layer (PHY) specifications. Amendment 10: Mesh networking. I. C. S. L. M. S. Committee et al. (2009). Ieee p802.11s/d2.06: Part 11: Wireless lan medium access control (MAC) and physical layer (PHY) specifications. Amendment 10: Mesh networking.
14.
Zurück zum Zitat Zhang, L., Zhang, F., Wu, Q., & Domingo-Ferrer, J. (2010). Simulatable certificateless two-party authenticated key agreement protocol. Information Sciences, 180(6), 1020–1030.MathSciNetCrossRefMATH Zhang, L., Zhang, F., Wu, Q., & Domingo-Ferrer, J. (2010). Simulatable certificateless two-party authenticated key agreement protocol. Information Sciences, 180(6), 1020–1030.MathSciNetCrossRefMATH
15.
Zurück zum Zitat Mokhtarnameh, R., Ho, S. B., & Muthuvelu, N. (2011). An enhanced certificateless authenticated key agreement protocol. In 13th International conference on advanced communication technology (ICACT) (pp. 802–806). New York: IEEE. Mokhtarnameh, R., Ho, S. B., & Muthuvelu, N. (2011). An enhanced certificateless authenticated key agreement protocol. In 13th International conference on advanced communication technology (ICACT) (pp. 802–806). New York: IEEE.
16.
Zurück zum Zitat Shi, Y., & Li, J. (2007). Two-party authenticated key agreement in certificateless public key cryptography. Wuhan University Journal of Natural Sciences, 12(1), 71–74.MathSciNetCrossRef Shi, Y., & Li, J. (2007). Two-party authenticated key agreement in certificateless public key cryptography. Wuhan University Journal of Natural Sciences, 12(1), 71–74.MathSciNetCrossRef
17.
Zurück zum Zitat Al-Riyami, S.S., & Paterson, K.G. (2003). Certificateless public key cryptography. In Advances in cryptology-ASIACRYPT 2003 (pp. 452–473). Berlin: Springer. Al-Riyami, S.S., & Paterson, K.G. (2003). Certificateless public key cryptography. In Advances in cryptology-ASIACRYPT 2003 (pp. 452–473). Berlin: Springer.
18.
Zurück zum Zitat Cheng, Z., & Comley, R. (2005). Efficient certificateless public key encryption. IACR Cryptology ePrint Archive, 2005, 12. Cheng, Z., & Comley, R. (2005). Efficient certificateless public key encryption. IACR Cryptology ePrint Archive, 2005, 12.
19.
Zurück zum Zitat Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In Advances in Cryptology—CRYPTO 2001 (pp. 213–229). Berlin: Springer. Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In Advances in Cryptology—CRYPTO 2001 (pp. 213–229). Berlin: Springer.
20.
Zurück zum Zitat Guo, H., Li, Z., Mu, Y., & Zhang, X. (2011). Provably secure identity-based authenticated key agreement protocols with malicious private key generators. Information Sciences, 181(3), 628–647.MathSciNetCrossRefMATH Guo, H., Li, Z., Mu, Y., & Zhang, X. (2011). Provably secure identity-based authenticated key agreement protocols with malicious private key generators. Information Sciences, 181(3), 628–647.MathSciNetCrossRefMATH
21.
Zurück zum Zitat Zhang, Z., Wong, D. S., Xu, J., & Feng, D. (2006). Certificateless public-key signature: Security model and efficient construction. In Applied cryptography and network security (pp. 293–308). Berlin: Springer. Zhang, Z., Wong, D. S., Xu, J., & Feng, D. (2006). Certificateless public-key signature: Security model and efficient construction. In Applied cryptography and network security (pp. 293–308). Berlin: Springer.
24.
Zurück zum Zitat Zhu, X., Jiang, S., Wang, L., & Li, H. (2013). Efficient privacy-preserving authentication for vehicular ad hoc networks. IEEE Transaction on Vehicular Technology, 63(2), 907–919.CrossRef Zhu, X., Jiang, S., Wang, L., & Li, H. (2013). Efficient privacy-preserving authentication for vehicular ad hoc networks. IEEE Transaction on Vehicular Technology, 63(2), 907–919.CrossRef
25.
Zurück zum Zitat Wander, A. S., Gura, N., Eberle, H., Gupta, V., & Shantz, S. C. (2005). Energy analysis of public-key cryptography for wireless sensor networks. In Third IEEE international conference on pervasive computing and communications, PerCom 2005 (pp. 324–328). New York: IEEE. Wander, A. S., Gura, N., Eberle, H., Gupta, V., & Shantz, S. C. (2005). Energy analysis of public-key cryptography for wireless sensor networks. In Third IEEE international conference on pervasive computing and communications, PerCom 2005 (pp. 324–328). New York: IEEE.
Metadaten
Titel
CAKA: a novel certificateless-based cross-domain authenticated key agreement protocol for wireless mesh networks
verfasst von
Yanping Li
Weifeng Chen
Zhiping Cai
Yuguang Fang
Publikationsdatum
01.11.2016
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 8/2016
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-015-1109-7

Weitere Artikel der Ausgabe 8/2016

Wireless Networks 8/2016 Zur Ausgabe

Neuer Inhalt