Skip to main content
Erschienen in: Wireless Personal Communications 2/2015

01.09.2015

Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme

verfasst von: Imran Memon, Ibrar Hussain, Rizwan Akhtar, Gencai Chen

Erschienen in: Wireless Personal Communications | Ausgabe 2/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Past few years, the mobile technology and location based services have experienced a great increment in number of its users. The privacy issues related to these services are becoming main concerns because of the leakage of users’ private information and contents. To prevent revelation of private information, many researchers have proposed several secure and authentication schemes which apply various technologies to provide integral security properties, such as symmetric encryption, digital signature, timestamp, etc. Unfortunately, some of these schemes still exhibit security and efficiency issues. In this research paper, we proposed an efficient and secure anonymous communication for location based service using asymmetric cryptography scheme over the wireless system was attempted missing some system detail. We also proposed the prevent user private information and secure communication by asymmetric cryptography scheme. We solved the wireless communication problem in A3 algorithm such as eavesdropping and this problem solved by asymmetric cryptography scheme because of its robustness against this type of attack by providing mutual authentication make the system more secure. Finally, performance and cost analysis show our scheme is more suitable for low-power and resource limited wireless system and thus availability for real implementation. According to our security analysis and performance, we can prove that our proposed asymmetric cryptography scheme is able to improve wireless communication system security and enhance efficiency in comparison to previous schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
2.
Zurück zum Zitat Lin, C.-Y., & Hung, M.-T. (2014). A location-based personal task reminder for mobile users. Personal and Ubiquitous Computing, 18(2), 303–314. Lin, C.-Y., & Hung, M.-T. (2014). A location-based personal task reminder for mobile users. Personal and Ubiquitous Computing, 18(2), 303–314.
3.
Zurück zum Zitat Memon, I., Domenic, K., Memon, H., Akhtar, R., Yong, W., & Zhang, F. (2014). Rumor riding: An anonymity approach for decentralized peer to peer systems. Wireless Personal Communication. doi:10.1007/s11277-014-1878-9 Memon, I., Domenic, K., Memon, H., Akhtar, R., Yong, W., & Zhang, F. (2014). Rumor riding: An anonymity approach for decentralized peer to peer systems. Wireless Personal Communication. doi:10.​1007/​s11277-014-1878-9
5.
Zurück zum Zitat Forsgren, H., Grahn, K., Karvi, T., & Pulkkis, G. (2010). Security and trust of public key cryptography options for HIP. In IEEE 10th international conference on computer and information technology (CIT), 2010 (pp. 1079–1084). IEEE. Forsgren, H., Grahn, K., Karvi, T., & Pulkkis, G. (2010). Security and trust of public key cryptography options for HIP. In IEEE 10th international conference on computer and information technology (CIT), 2010 (pp. 1079–1084). IEEE.
6.
Zurück zum Zitat Seo, S. H., Won, J., & Bertino, E. (2014). POSTER: A pairing-free certificate less hybrid sign-cryption scheme for advanced metering infrastructures. In Proceedings of the 4th ACM conference on data and application security and privacy (pp. 143–146). ACM. Seo, S. H., Won, J., & Bertino, E. (2014). POSTER: A pairing-free certificate less hybrid sign-cryption scheme for advanced metering infrastructures. In Proceedings of the 4th ACM conference on data and application security and privacy (pp. 143–146). ACM.
7.
Zurück zum Zitat Islam, S. H., & Biswas, G. (2012). Certificateless strong designated verifier multisignature scheme using bilinear pairings. In Proceedings of the international conference on advances in computing, communications and informatics (pp. 540–546). ACM. Islam, S. H., & Biswas, G. (2012). Certificateless strong designated verifier multisignature scheme using bilinear pairings. In Proceedings of the international conference on advances in computing, communications and informatics (pp. 540–546). ACM.
8.
Zurück zum Zitat Wu, X., Xu, L., & Zhang, X. (2011). Poster: A certificateless proxy re-encryption scheme for cloud-based data sharing. In Proceedings of the 18th ACM conference on computer and communications security (pp. 869–872). ACM. Wu, X., Xu, L., & Zhang, X. (2011). Poster: A certificateless proxy re-encryption scheme for cloud-based data sharing. In Proceedings of the 18th ACM conference on computer and communications security (pp. 869–872). ACM.
9.
Zurück zum Zitat Liu, J. K., Au, M. H., & Susilo, W. (2007). Self-generated-certificate public key cryptography and Certificateless signature/encryption scheme in the standard model. In Proceedings of the 2nd ACM symposium on information, computer and communications security, (pp. 273–283). ACM. Liu, J. K., Au, M. H., & Susilo, W. (2007). Self-generated-certificate public key cryptography and Certificateless signature/encryption scheme in the standard model. In Proceedings of the 2nd ACM symposium on information, computer and communications security, (pp. 273–283). ACM.
10.
Zurück zum Zitat Cho, J.-H., Chan, K. S., & Chen, I.-R. (2013). Composite trust-based public keymanagement inmobile ad hoc networks. In Proceedings of the 28th annual ACM symposium on applied computing, (pp. 1949–1956). ACM. Cho, J.-H., Chan, K. S., & Chen, I.-R. (2013). Composite trust-based public keymanagement inmobile ad hoc networks. In Proceedings of the 28th annual ACM symposium on applied computing, (pp. 1949–1956). ACM.
11.
Zurück zum Zitat Meyer, U., & Wetzel, S. (2004). A man-in-the-middle attack on UMTS. In Proceedings of the 3rd ACM workshop on wireless security (pp. 90–97). ACM. Meyer, U., & Wetzel, S. (2004). A man-in-the-middle attack on UMTS. In Proceedings of the 3rd ACM workshop on wireless security (pp. 90–97). ACM.
12.
Zurück zum Zitat Hasan, M. R., Abdallah, S., Raja, A. (2014). Topology aware convention emergence. In AAMAS ‘14: Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems Hasan, M. R., Abdallah, S., Raja, A. (2014). Topology aware convention emergence. In AAMAS ‘14: Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems
13.
Zurück zum Zitat Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key. Wireless Personal Communication. doi:10.1007/s11277-014-1879-8 Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key. Wireless Personal Communication. doi:10.​1007/​s11277-014-1879-8
14.
Zurück zum Zitat Hanaoka, G. (2013). On the properties of public key encryption from group signatures. In Proceedings of the first ACM workshop on Asia public-key cryptography (pp. 1–2). ACM. Hanaoka, G. (2013). On the properties of public key encryption from group signatures. In Proceedings of the first ACM workshop on Asia public-key cryptography (pp. 1–2). ACM.
15.
Zurück zum Zitat Nagy, M., & Kotuliak, I. (2013). DEnhancing security in mobile data networks through end user and core network cooperation. In MoMM ‘13: Proceedings of international conference on advances in mobile computing and multimedia. ACM. Nagy, M., & Kotuliak, I. (2013). DEnhancing security in mobile data networks through end user and core network cooperation. In MoMM ‘13: Proceedings of international conference on advances in mobile computing and multimedia. ACM.
16.
Zurück zum Zitat Nicanfar, H., TalebiFard, P., Hosseininezhad, S., Leung, V., & Damm, M. (2013). Security and privacy of electric vehicles in the smart grid context: problem and solution. In Proceedings of the third ACM international symposium on design and analysis of intelligent vehicular networks and applications (pp. 45–54). ACM. Nicanfar, H., TalebiFard, P., Hosseininezhad, S., Leung, V., & Damm, M. (2013). Security and privacy of electric vehicles in the smart grid context: problem and solution. In Proceedings of the third ACM international symposium on design and analysis of intelligent vehicular networks and applications (pp. 45–54). ACM.
17.
Zurück zum Zitat Otto, M. (2012). Highly acyclic groups, hypergraph covers, and the guarded fragment. Journal of the ACM (JACM), 59(1), 5.CrossRef Otto, M. (2012). Highly acyclic groups, hypergraph covers, and the guarded fragment. Journal of the ACM (JACM), 59(1), 5.CrossRef
18.
Zurück zum Zitat Al-Riyami, S., & Paterson, K. (2003) Certificateless public key cryptography. In Advances in Cryptology-Asiacrypt’2003, Lecture Notes in Computer Science (vol. 2894, pp. 452–473). Springer. Al-Riyami, S., & Paterson, K. (2003) Certificateless public key cryptography. In Advances in Cryptology-Asiacrypt’2003, Lecture Notes in Computer Science (vol. 2894, pp. 452–473). Springer.
19.
Zurück zum Zitat Akhtar, R., Leng, S., Memon, I., Ali, M., Zhang, L. (2014). Architecture of hybrid mobile social networks for efficient content delivery. Wireless Personal Communication. doi:10.1007/s11277-014-1996-4 Akhtar, R., Leng, S., Memon, I., Ali, M., Zhang, L. (2014). Architecture of hybrid mobile social networks for efficient content delivery. Wireless Personal Communication. doi:10.​1007/​s11277-014-1996-4
21.
Zurück zum Zitat Cho, J.-H., Chan, K. S., Chen, I.-R. (2013). Composite trust-based public key management in mobile ad hoc networks. In SAC ‘13: Proceedings of the 28th annual ACM symposium on applied computing. Cho, J.-H., Chan, K. S., Chen, I.-R. (2013). Composite trust-based public key management in mobile ad hoc networks. In SAC ‘13: Proceedings of the 28th annual ACM symposium on applied computing.
22.
Zurück zum Zitat Höller, A., Druml, N., Kreiner, C., Steger, C., Felicijan, T. (2014). Hardware/software co-design of elliptic-curve cryptography for resource-constrained applications. In DAC ‘14: Proceedings of the the 51st annual design automation conference on design automation conference. Höller, A., Druml, N., Kreiner, C., Steger, C., Felicijan, T. (2014). Hardware/software co-design of elliptic-curve cryptography for resource-constrained applications. In DAC ‘14: Proceedings of the the 51st annual design automation conference on design automation conference.
23.
Zurück zum Zitat Ghinita, G., & Rughinis, R. (2014). A privacy-preserving location-based alert system. In SIGSPATIAL’13: Proceedings of the 21st ACM SIGSPATIAL international conference on advances in geographic information systems. Ghinita, G., & Rughinis, R. (2014). A privacy-preserving location-based alert system. In SIGSPATIAL’13: Proceedings of the 21st ACM SIGSPATIAL international conference on advances in geographic information systems.
24.
Zurück zum Zitat Antão, S., & Sousa, L. (2013). The CRNS framework and its application to programmable and reconfigurable cryptography. Transactions on Architecture and Code Optimization (TACO), 9(4) Antão, S., & Sousa, L. (2013). The CRNS framework and its application to programmable and reconfigurable cryptography. Transactions on Architecture and Code Optimization (TACO), 9(4)
26.
Zurück zum Zitat Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1), 18–36.CrossRef Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1), 18–36.CrossRef
27.
Zurück zum Zitat Kuo, W. C., Wei, H. J., & Cheng, J. C. (2014). An efficient and secure anonymous mobility network authentication scheme. Journal of Information Security and Applications, Available online 13, March 2014. Kuo, W. C., Wei, H. J., & Cheng, J. C. (2014). An efficient and secure anonymous mobility network authentication scheme. Journal of Information Security and Applications, Available online 13, March 2014.
28.
Zurück zum Zitat Zhao, D., Peng, H., Li, L., & Yang, Y. (2014). A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 78, 247–269. doi:10.1007/s11277-014-1750-y.CrossRef Zhao, D., Peng, H., Li, L., & Yang, Y. (2014). A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 78, 247–269. doi:10.​1007/​s11277-014-1750-y.CrossRef
29.
Zurück zum Zitat Xie, Q., Hu, B., Bao, B., & Yu, X. (2013). Robust anonymous two-factor authentication scheme for roaming service in global mobility network. Wireless Personal Communications, 74(2), 601–614.CrossRef Xie, Q., Hu, B., Bao, B., & Yu, X. (2013). Robust anonymous two-factor authentication scheme for roaming service in global mobility network. Wireless Personal Communications, 74(2), 601–614.CrossRef
30.
Zurück zum Zitat Wei, Jianghong, Liu, Wenfen, & Xuexian, Hu. (2014). Cryptanalysis and improvement of a robust smart card authentication scheme for multi-server architecture. Wireless Personal Communications, 77, 2255–2269. doi:10.1007/s11277-014-1636-z.CrossRef Wei, Jianghong, Liu, Wenfen, & Xuexian, Hu. (2014). Cryptanalysis and improvement of a robust smart card authentication scheme for multi-server architecture. Wireless Personal Communications, 77, 2255–2269. doi:10.​1007/​s11277-014-1636-z.CrossRef
Metadaten
Titel
Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme
verfasst von
Imran Memon
Ibrar Hussain
Rizwan Akhtar
Gencai Chen
Publikationsdatum
01.09.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2699-1

Weitere Artikel der Ausgabe 2/2015

Wireless Personal Communications 2/2015 Zur Ausgabe

Neuer Inhalt