Skip to main content
Top
Published in: Wireless Personal Communications 4/2017

12-10-2016

A New Certificateless and Secure Authentication Scheme for Ad hoc Networks

Authors: Shaghayegh Bakhtiari-Chehelcheshmeh, Mehdi Hosseinzadeh

Published in: Wireless Personal Communications | Issue 4/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Most of the authentication protocols which have been proposed so far are vulnerable to security attacks, and none of them provides non-repudiation property. Therefore, this paper aims to present a novel certificateless and secure mutual authentication scheme using identity-based encryption and bilinear pairings for ad hoc networks. Unlike the existing schemes, our scheme provides non-repudiation and digital signature properties for all network participants in such a way that a receiver of a message can prove who has sent the message. We also provide formal proofs for the security of our scheme using the Burrows, Abadi, and Needham logic and simulate it using the Automated Validation of Internet Security Protocols and Applications tool. Moreover, we compare our protocol and some related protocols from two perspectives: computational cost and security properties.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hoeper, K. (2007). Authentication and key exchange in mobile ad hoc networks. Doctor of Philosophy Thesis, University of Waterloo. Hoeper, K. (2007). Authentication and key exchange in mobile ad hoc networks. Doctor of Philosophy Thesis, University of Waterloo.
2.
go back to reference Shamir, A. (1985). Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO 84 on advances in cryptology (pp. 47–53). Springer. Shamir, A. (1985). Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO 84 on advances in cryptology (pp. 47–53). Springer.
3.
go back to reference Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In Advances in cryptology—CRYPTO 2001 (Vol. 32, pp. 213–229). Springer. doi:10.1137/S0097539701398521. Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In Advances in cryptologyCRYPTO 2001 (Vol. 32, pp. 213–229). Springer. doi:10.​1137/​S009753970139852​1.
4.
go back to reference Gentry, C., Peikert, C., & Vaikuntanathan, V. (2008). Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of the fortieth annual ACM symposium on Theory of computing (pp. 197–206). ACM. doi:10.1145/1374376.1374407. Gentry, C., Peikert, C., & Vaikuntanathan, V. (2008). Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of the fortieth annual ACM symposium on Theory of computing (pp. 197–206). ACM. doi:10.​1145/​1374376.​1374407.
6.
go back to reference Eslami, Z., Noroozi, M., & Rad, S. K. (2016). Provably secure group key exchange protocol in the presence of dishonest insiders. International Journal of Network Security, 18(1), 33–42. Eslami, Z., Noroozi, M., & Rad, S. K. (2016). Provably secure group key exchange protocol in the presence of dishonest insiders. International Journal of Network Security, 18(1), 33–42.
8.
go back to reference Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In Advances in cryptology—ASIACRYPT 2003 (pp. 452–473). Springer. doi:10.1007/978-3-540-40061-5. Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In Advances in cryptologyASIACRYPT 2003 (pp. 452–473). Springer. doi:10.​1007/​978-3-540-40061-5.
13.
go back to reference Vallent, T. F., & Kim, H. (2013). Three factor authentication protocol based on bilinear pairing. In Multimedia and ubiquitous engineering (pp. 253–259). Springer. doi:10.1007/978-3-642-54900-7. Vallent, T. F., & Kim, H. (2013). Three factor authentication protocol based on bilinear pairing. In Multimedia and ubiquitous engineering (pp. 253–259). Springer. doi:10.​1007/​978-3-642-54900-7.
14.
15.
go back to reference Luo, M., & Zhao, H. (2015). An authentication and key agreement mechanism for multi-domain wireless networks using certificateless public-key cryptography. Wireless Personal Communications, 81(2), 779–798. doi:10.1007/s11277-014-2157-5.CrossRef Luo, M., & Zhao, H. (2015). An authentication and key agreement mechanism for multi-domain wireless networks using certificateless public-key cryptography. Wireless Personal Communications, 81(2), 779–798. doi:10.​1007/​s11277-014-2157-5.CrossRef
16.
go back to reference Tsai, J.-L., & Lo, N.-W. (2015). Provably secure and efficient anonymous ID-based authentication protocol for mobile devices using bilinear pairings. Wireless Personal Communications, 83(2), 1273–1286. doi:10.1007/s11277-015-2449-4.CrossRef Tsai, J.-L., & Lo, N.-W. (2015). Provably secure and efficient anonymous ID-based authentication protocol for mobile devices using bilinear pairings. Wireless Personal Communications, 83(2), 1273–1286. doi:10.​1007/​s11277-015-2449-4.CrossRef
18.
go back to reference Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1), 18–36.CrossRefMATH Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1), 18–36.CrossRefMATH
19.
go back to reference Cremers, C., Mauw, S., & de Vink, E. (2003). Formal methods for security protocols: Three examples of the black-box approach. NVTI Newsletter, 7, 21–32. Cremers, C., Mauw, S., & de Vink, E. (2003). Formal methods for security protocols: Three examples of the black-box approach. NVTI Newsletter, 7, 21–32.
21.
go back to reference Armando, A., Basin, D., Boichut, Y., Chevalier, Y., & Compagna, L. (2005). The AVISPA tool for the automated validation of internet security protocols and applications. In Computer aided verification (pp. 281–285). Springer. Armando, A., Basin, D., Boichut, Y., Chevalier, Y., & Compagna, L. (2005). The AVISPA tool for the automated validation of internet security protocols and applications. In Computer aided verification (pp. 281–285). Springer.
22.
go back to reference Ziauddin, S., & Martin, B. (2013). Formal analysis of ISO/IEC 9798-2 authentication standard using AVISPA. In 2013 eighth Asia joint conference on information security (pp. 108–114). IEEE. doi:10.1109/ASIAJCIS.2013.25. Ziauddin, S., & Martin, B. (2013). Formal analysis of ISO/IEC 9798-2 authentication standard using AVISPA. In 2013 eighth Asia joint conference on information security (pp. 108–114). IEEE. doi:10.​1109/​ASIAJCIS.​2013.​25.
23.
go back to reference Hernandez-Ardieta, J. L., Gonzalez-tablas, A. I., & Ramos, B. (2009). Formal validation of OFEPSP + with AVISPA. In Foundations and applications of security analysis (pp. 124–137). Springer. Hernandez-Ardieta, J. L., Gonzalez-tablas, A. I., & Ramos, B. (2009). Formal validation of OFEPSP + with AVISPA. In Foundations and applications of security analysis (pp. 124–137). Springer.
26.
go back to reference Barreto, P. S., Kim, H. Y., Lynn, B., & Scott, M. (2002). Efficient algorithms for pairing-based cryptosystems. In Advances in cryptology—CRYPTO 2002 (pp. 354–369). Springer. Barreto, P. S., Kim, H. Y., Lynn, B., & Scott, M. (2002). Efficient algorithms for pairing-based cryptosystems. In Advances in cryptologyCRYPTO 2002 (pp. 354–369). Springer.
27.
go back to reference Hafizul, S. K., & Biswas, I. G. P. (2015). Design of two-party authenticated key agreement protocol based on ECC and self-certified public keys. Wireless Personal Communications, 82(4), 2727–2750. doi:10.1007/s11277-015-2375-5.CrossRef Hafizul, S. K., & Biswas, I. G. P. (2015). Design of two-party authenticated key agreement protocol based on ECC and self-certified public keys. Wireless Personal Communications, 82(4), 2727–2750. doi:10.​1007/​s11277-015-2375-5.CrossRef
28.
go back to reference Dolev, D., & Yao, A. C. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198–208.MathSciNetCrossRefMATH Dolev, D., & Yao, A. C. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198–208.MathSciNetCrossRefMATH
Metadata
Title
A New Certificateless and Secure Authentication Scheme for Ad hoc Networks
Authors
Shaghayegh Bakhtiari-Chehelcheshmeh
Mehdi Hosseinzadeh
Publication date
12-10-2016
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2017
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3721-y

Other articles of this Issue 4/2017

Wireless Personal Communications 4/2017 Go to the issue