Skip to main content
Erschienen in: Wireless Personal Communications 3/2016

01.04.2016

PF-ID-2PAKA: Pairing Free Identity-Based Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks

verfasst von: Suman Bala, Gaurav Sharma, Anil K. Verma

Erschienen in: Wireless Personal Communications | Ausgabe 3/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

To ensure secure communication between any two entities, authenticated key agreement protocol is the primary step and current research has a lot of contribution in this direction. In this paper, we propose a Pairing Free Identity-based Two-Party Authenticated Key Agreement protocol and gather the implementation results for Wireless Sensor Networks on MICAz mote by using Relic-toolkit cryptographic library. The proposed protocol is efficient as it does not use any pairing operation and only uses three scalar point multiplications. The security of the protocol has been proved secure using strongest security model for identity-based key agreement protocol presented by Liang et al.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
2.
Zurück zum Zitat Smart, N. (2002). Identity-based authenticated key agreement protocol based on weil pairing. Electronics Letters, 38(13), 630–632.CrossRefMATH Smart, N. (2002). Identity-based authenticated key agreement protocol based on weil pairing. Electronics Letters, 38(13), 630–632.CrossRefMATH
3.
Zurück zum Zitat Boneh, D., & Franklin, M. (2001) Identity-based encryption from the weil pairing. In Advances in cryptology CRYPTO 2001, volume 2139 of lecture notes in computer science (pp. 213–229). Berlin: Springer. doi:10.1007/3-540-44647-8_13. Boneh, D., & Franklin, M. (2001) Identity-based encryption from the weil pairing. In Advances in cryptology CRYPTO 2001, volume 2139 of lecture notes in computer science (pp. 213–229). Berlin: Springer. doi:10.​1007/​3-540-44647-8_​13.
4.
Zurück zum Zitat Chen, L., & Kudla, C. (2003). Identity based authenticated key agreement protocols from pairings. In Proceedings of the 16th IEEE computer security foundations workshop, 2003, pp. 219–233. Chen, L., & Kudla, C. (2003). Identity based authenticated key agreement protocols from pairings. In Proceedings of the 16th IEEE computer security foundations workshop, 2003, pp. 219–233.
5.
Zurück zum Zitat Shim, K. (2003). Efficient ID-based authenticated key agreement protocol based on weil pairing. Electronics Letters, 39(8), 653–654.CrossRef Shim, K. (2003). Efficient ID-based authenticated key agreement protocol based on weil pairing. Electronics Letters, 39(8), 653–654.CrossRef
6.
Zurück zum Zitat Xun, Y. (2003). Efficient ID-based key agreement from weil pairing. Electronics Letters, 39(2), 206–208.CrossRef Xun, Y. (2003). Efficient ID-based key agreement from weil pairing. Electronics Letters, 39(2), 206–208.CrossRef
7.
Zurück zum Zitat Sun, H., & Hsieh, B. (2003). Security analysis of shim’s authenticated key agreement protocols from pairings. Cryptology ePrint Archive, Report 2003/113. http://eprint.iacr.org/. Sun, H., & Hsieh, B. (2003). Security analysis of shim’s authenticated key agreement protocols from pairings. Cryptology ePrint Archive, Report 2003/113. http://​eprint.​iacr.​org/​.
8.
Zurück zum Zitat Boyd, C., & Choo, K. (2005). Security of two-party identity-based key agreement. In Progress in cryptology mycrypt 2005, volume 3715 of lecture notes in computer science (pp. 229–243). Berlin: Springer. doi:10.1007/11554868_17. Boyd, C., & Choo, K. (2005). Security of two-party identity-based key agreement. In Progress in cryptology mycrypt 2005, volume 3715 of lecture notes in computer science (pp. 229–243). Berlin: Springer. doi:10.​1007/​11554868_​17.
9.
Zurück zum Zitat Ryu, E., Yoon, E., & Yoo, K. An efficient id-based authenticated key agreement protocol from pairings. In Networking 2004, volume 3042 of lecture notes in computer science (pp. 1458–1463). Berlin: Springer. doi:10.1007/978-3-540-24693-0_135. Ryu, E., Yoon, E., & Yoo, K. An efficient id-based authenticated key agreement protocol from pairings. In Networking 2004, volume 3042 of lecture notes in computer science (pp. 1458–1463). Berlin: Springer. doi:10.​1007/​978-3-540-24693-0_​135.
11.
Zurück zum Zitat McCullagh, N., & Barreto, P. (2005). A new two-party identity-based authenticated key agreement. In Topics in cryptology CT-RSA 2005, volume 3376 of lecture notes in computer science (pp. 262–274). Berlin: Springer. doi:10.1007/978-3-540-30574-3_18. McCullagh, N., & Barreto, P. (2005). A new two-party identity-based authenticated key agreement. In Topics in cryptology CT-RSA 2005, volume 3376 of lecture notes in computer science (pp. 262–274). Berlin: Springer. doi:10.​1007/​978-3-540-30574-3_​18.
12.
Zurück zum Zitat Xie, G. (2004). Cryptanalysis of noel mccullagh and paulo s. l. m. barretos two-party identity-based key agreement. Cryptology ePrint Archive, Report 2004/308. http://eprint.iacr.org/. Xie, G. (2004). Cryptanalysis of noel mccullagh and paulo s. l. m. barretos two-party identity-based key agreement. Cryptology ePrint Archive, Report 2004/308. http://​eprint.​iacr.​org/​.
17.
Zurück zum Zitat Kudla, C., & Paterson, K. (2005). Modular security proofs for key agreement protocols. Advances in cryptology—ASIACRYPT 2005, volume 3788 of lecture notes in computer science (pp. 549–565) Berlin: Springer. Kudla, C., & Paterson, K. (2005). Modular security proofs for key agreement protocols. Advances in cryptology—ASIACRYPT 2005, volume 3788 of lecture notes in computer science (pp. 549–565) Berlin: Springer.
18.
Zurück zum Zitat Hafizul, S., & Biswas, G. (2012). An improved pairing-free identity-based authenticated key agreement protocol based on ECC. Procedia Engineering, 30, 499–507. International conference on communication technology and system design 2011.CrossRef Hafizul, S., & Biswas, G. (2012). An improved pairing-free identity-based authenticated key agreement protocol based on ECC. Procedia Engineering, 30, 499–507. International conference on communication technology and system design 2011.CrossRef
19.
Zurück zum Zitat Blake, S., Johnson, D., & Menezes, A. (1997). Key agreement protocols and their security analysis. Crytography and Coding, volume 1355 of Lecture Notes in Computer Science (pp. 30–45). Berlin: Springer. Blake, S., Johnson, D., & Menezes, A. (1997). Key agreement protocols and their security analysis. Crytography and Coding, volume 1355 of Lecture Notes in Computer Science (pp. 30–45). Berlin: Springer.
20.
Zurück zum Zitat Levis, P., Madden, S., Polastre, J., Szewczyk, R., Whitehouse, K., Woo, A., et al. (2005). Tinyos: An operating system for sensor networks. In Ambient intelligence (pp. 115–148). Berlin: Springer. doi:10.1007/3-540-27139-2_7. Levis, P., Madden, S., Polastre, J., Szewczyk, R., Whitehouse, K., Woo, A., et al. (2005). Tinyos: An operating system for sensor networks. In Ambient intelligence (pp. 115–148). Berlin: Springer. doi:10.​1007/​3-540-27139-2_​7.
23.
Zurück zum Zitat Liang, N., Gongliang, C., & Jianhua, L. (2013). Escrowable identity-based authenticated key agreement protocol with strong security. Computers & Mathematics with Applications, 65(9), 1339–1349. Advanced Information Security.MathSciNetCrossRef Liang, N., Gongliang, C., & Jianhua, L. (2013). Escrowable identity-based authenticated key agreement protocol with strong security. Computers & Mathematics with Applications, 65(9), 1339–1349. Advanced Information Security.MathSciNetCrossRef
24.
Zurück zum Zitat LaMacchia, B., Lauter, K., & Mityagin, A. (2007). Stronger security of authenticated key exchange. In Provable security, volume 4784 of lecture notes in computer science (pp. 1–16). Berlin: Springer. doi:10.1007/978-3-540-75670-5_1. LaMacchia, B., Lauter, K., & Mityagin, A. (2007). Stronger security of authenticated key exchange. In Provable security, volume 4784 of lecture notes in computer science (pp. 1–16). Berlin: Springer. doi:10.​1007/​978-3-540-75670-5_​1.
Metadaten
Titel
PF-ID-2PAKA: Pairing Free Identity-Based Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks
verfasst von
Suman Bala
Gaurav Sharma
Anil K. Verma
Publikationsdatum
01.04.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2016
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2626-5

Weitere Artikel der Ausgabe 3/2016

Wireless Personal Communications 3/2016 Zur Ausgabe

Neuer Inhalt