Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 2/2015

01-03-2015

EAPSG: Efficient authentication protocol for secure group communications in maritime wideband communication networks

Authors: Tingting Yang, Chengzhe Lai, Rongxing Lu, Rong Jiang

Published in: Peer-to-Peer Networking and Applications | Issue 2/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The maritime wideband communication network, which extends the operation of wireless access from land to sea, will significantly contribute to the maritime distress, urgency, safety, and general communications. The Worldwide Interoperability for Microwave Access (WiMAX) technology has been applied to establish a maritime wideband shore-side network infrastructure, to achieve large capacity data backhauls. However, in this scenario, many new security and privacy challenges are arising, e.g., the reduced time overhead for group access authentication due to limited time window vessels passing by infostations along the shore-side. In this paper, a simple and reliable group authentication framework is developed for dealing with security issues in this special maritime wideband communication scenario. Specifically, an efficient authentication protocol for secure group communications (EAPSG) in maritime wideband communication network is proposed based on the Elliptic Curve Diffie-Hellman (ECDH), to overcome the weakness existing in the prevailing protocols on land, i.e., user identity disclosure, the lack of perfect forward secrecy, and man-in-the-middle attacks. Meanwhile, EAPSG can reduce the communication overhead and computational complexity by designing group access authentication procedures. Compared with conventional EAP-AKA protocol used in WiMAX networks on land, our scheme enhances the security and provides better performance. Especially, the security of the proposed protocol was verified by Automated Validation of Internet Security Protocols and Applications (AVISPA), and detailed performance evaluations are also given. The results illustrate that the proposed EAPSG outperforms other existing schemes on land in terms of the delivery cost and the number of signaling messages.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
We use the term of vessel and ship interchangeably.
 
Literature
2.
go back to reference Yang T, Liang H, Cheng N, Shen X (2013) Towards video packets store-carry-and-forward scheduling in maritime wideband communication. accepted by IEEE GLOBECOM’13 Yang T, Liang H, Cheng N, Shen X (2013) Towards video packets store-carry-and-forward scheduling in maritime wideband communication. accepted by IEEE GLOBECOM’13
3.
go back to reference Maglogiannis I, Hadjiefthymiades S, Panagiotarakis N, Hartigan P (2005) Next generation maritime communication systems. Int J Mob Commun 3(3):231–248CrossRef Maglogiannis I, Hadjiefthymiades S, Panagiotarakis N, Hartigan P (2005) Next generation maritime communication systems. Int J Mob Commun 3(3):231–248CrossRef
4.
go back to reference Mitropoulos E (2007) E-navigation: a global resource. seaways. In: The international journal of the nautical institute Mitropoulos E (2007) E-navigation: a global resource. seaways. In: The international journal of the nautical institute
5.
go back to reference Zhou M-T, Harada H (2012) Cognitive maritime wireless mesh/ad hoc networks. J Netw Comput Appl 35(2):518–526CrossRef Zhou M-T, Harada H (2012) Cognitive maritime wireless mesh/ad hoc networks. J Netw Comput Appl 35(2):518–526CrossRef
7.
go back to reference Hoang VD, Ma M, Miura R, Fujise M (2007) A novel way for handover in maritime WiMAX mesh network. In: Proceedings of IEEE ITST, pp 1–4 Hoang VD, Ma M, Miura R, Fujise M (2007) A novel way for handover in maritime WiMAX mesh network. In: Proceedings of IEEE ITST, pp 1–4
8.
go back to reference Funk P, Blake-Wilson S (2008) Extensible authentication protocol tunneled transport layer security authenticated protocol version 0 (EAP-TTLSv0). In: RFC5281 Funk P, Blake-Wilson S (2008) Extensible authentication protocol tunneled transport layer security authenticated protocol version 0 (EAP-TTLSv0). In: RFC5281
9.
go back to reference Palekar A, Simon D, Zorn G, Josefsson S (2004) Protected EAP protocol (PEAP). In: Work in Progress Palekar A, Simon D, Zorn G, Josefsson S (2004) Protected EAP protocol (PEAP). In: Work in Progress
10.
go back to reference Yuan G, ZHU K, FANG N-s, WU G-x (2006) Research and application of 802.1 x/EAP-PEAP. Comput Eng Des 10:34 Yuan G, ZHU K, FANG N-s, WU G-x (2006) Research and application of 802.1 x/EAP-PEAP. Comput Eng Des 10:34
11.
go back to reference Dantu R, Clothier G, Atri A (2007) EAP methods for wireless networks. Comput Stand Interfaces 29(3):289–301CrossRef Dantu R, Clothier G, Atri A (2007) EAP methods for wireless networks. Comput Stand Interfaces 29(3):289–301CrossRef
12.
go back to reference Pereniguez F, Kambourakis G, Marin-Lopez R, Gritzalis S, Gomez A (2010) Privacy-enhanced fast re-authentication for EAP-based next generation network. Comput Commun 33(14):1682–1694CrossRef Pereniguez F, Kambourakis G, Marin-Lopez R, Gritzalis S, Gomez A (2010) Privacy-enhanced fast re-authentication for EAP-based next generation network. Comput Commun 33(14):1682–1694CrossRef
13.
go back to reference Marin-Lopez R, Pereniguez F, Bernal F, Gomez A (2010) Secure three-party key distribution protocol for fast network access in EAP-based wireless networks. Comput Netw 54(15):2651–2673CrossRefMATH Marin-Lopez R, Pereniguez F, Bernal F, Gomez A (2010) Secure three-party key distribution protocol for fast network access in EAP-based wireless networks. Comput Netw 54(15):2651–2673CrossRefMATH
14.
go back to reference Marin-Lopez R, Ohba Y, Pereniguez F, Gomez AF (2010) Analysis of handover key management schemes under IETF perspective. Comput Stand Interfaces 32(5):266–273CrossRef Marin-Lopez R, Ohba Y, Pereniguez F, Gomez AF (2010) Analysis of handover key management schemes under IETF perspective. Comput Stand Interfaces 32(5):266–273CrossRef
15.
go back to reference Al Shidhani AA, Leung VC (2011) Fast and secure reauthentications for 3GPP subscribers during WiMAX-WLAN handovers. IEEE Trans Dependable Secure Comput 8(5):699–713CrossRef Al Shidhani AA, Leung VC (2011) Fast and secure reauthentications for 3GPP subscribers during WiMAX-WLAN handovers. IEEE Trans Dependable Secure Comput 8(5):699–713CrossRef
16.
go back to reference Jiang R, Luo J, Wang X (2013) HRKT: a hierarchical route key tree based group key management for wireless sensor networks. KSII Trans Internet Inf Syst (TIIS) 7(8):2042–2060CrossRef Jiang R, Luo J, Wang X (2013) HRKT: a hierarchical route key tree based group key management for wireless sensor networks. KSII Trans Internet Inf Syst (TIIS) 7(8):2042–2060CrossRef
17.
go back to reference Ngo HH, Wu X, Le PD, Srinivasan B (2010) An individual and group authentication model for wireless network services. J Converg Inf Technol 5(1):82–94CrossRef Ngo HH, Wu X, Le PD, Srinivasan B (2010) An individual and group authentication model for wireless network services. J Converg Inf Technol 5(1):82–94CrossRef
18.
go back to reference Chen Y-W, Wang J-T, Chi K-H, Tseng C-C (2012) Group-based authentication and key agreement. Wirel Pers Commun 62(4):965–979CrossRef Chen Y-W, Wang J-T, Chi K-H, Tseng C-C (2012) Group-based authentication and key agreement. Wirel Pers Commun 62(4):965–979CrossRef
19.
go back to reference Aboudagga N, Quisquater J-J, Eltoweissy M (2007) Group authentication protocol for mobile networks. In: Proceeding of IEEE WiMOB, pp 28–28 Aboudagga N, Quisquater J-J, Eltoweissy M (2007) Group authentication protocol for mobile networks. In: Proceeding of IEEE WiMOB, pp 28–28
20.
go back to reference Lai C, Li H, Li X, Cao J (2013) A novel group access authentication and key agreement protocol for machine-type communication. In: Transactions on emerging telecommunications technologies Lai C, Li H, Li X, Cao J (2013) A novel group access authentication and key agreement protocol for machine-type communication. In: Transactions on emerging telecommunications technologies
21.
go back to reference Jiang R, Lai C, Luo J, Wang X, Wang H (2013) EAP-based group authentication and key agreement protocol for machine-type communications. Int J Distrib Sensor Net 2013(2013):1–14 Jiang R, Lai C, Luo J, Wang X, Wang H (2013) EAP-based group authentication and key agreement protocol for machine-type communications. Int J Distrib Sensor Net 2013(2013):1–14
22.
go back to reference Lai C, Li H, Lu R, Shen XS (2013) SE-AKA: a secure and efficient group authentication and key agreement protocol for lte networks. Comput Netw 57(17):3492–3510CrossRef Lai C, Li H, Lu R, Shen XS (2013) SE-AKA: a secure and efficient group authentication and key agreement protocol for lte networks. Comput Netw 57(17):3492–3510CrossRef
23.
go back to reference Lai C, Li H, Lu R, Jiang R, Shen XS (2013) LGTH: a lightweight group authentication protocol for machine-type communication in LTE networks. In: Proceedings of IEEE Globecom Lai C, Li H, Lu R, Jiang R, Shen XS (2013) LGTH: a lightweight group authentication protocol for machine-type communication in LTE networks. In: Proceedings of IEEE Globecom
24.
go back to reference Lu R, Liang X, Li X, Lin X, Shen X (2012) EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans Parallel Distrib Syst 23(9):1621–1631CrossRef Lu R, Liang X, Li X, Lin X, Shen X (2012) EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans Parallel Distrib Syst 23(9):1621–1631CrossRef
Metadata
Title
EAPSG: Efficient authentication protocol for secure group communications in maritime wideband communication networks
Authors
Tingting Yang
Chengzhe Lai
Rongxing Lu
Rong Jiang
Publication date
01-03-2015
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 2/2015
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-014-0251-9

Other articles of this Issue 2/2015

Peer-to-Peer Networking and Applications 2/2015 Go to the issue

Premium Partner