Skip to main content
Erschienen in: Wireless Personal Communications 4/2017

12.10.2016

A New Certificateless and Secure Authentication Scheme for Ad hoc Networks

verfasst von: Shaghayegh Bakhtiari-Chehelcheshmeh, Mehdi Hosseinzadeh

Erschienen in: Wireless Personal Communications | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Most of the authentication protocols which have been proposed so far are vulnerable to security attacks, and none of them provides non-repudiation property. Therefore, this paper aims to present a novel certificateless and secure mutual authentication scheme using identity-based encryption and bilinear pairings for ad hoc networks. Unlike the existing schemes, our scheme provides non-repudiation and digital signature properties for all network participants in such a way that a receiver of a message can prove who has sent the message. We also provide formal proofs for the security of our scheme using the Burrows, Abadi, and Needham logic and simulate it using the Automated Validation of Internet Security Protocols and Applications tool. Moreover, we compare our protocol and some related protocols from two perspectives: computational cost and security properties.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hoeper, K. (2007). Authentication and key exchange in mobile ad hoc networks. Doctor of Philosophy Thesis, University of Waterloo. Hoeper, K. (2007). Authentication and key exchange in mobile ad hoc networks. Doctor of Philosophy Thesis, University of Waterloo.
2.
Zurück zum Zitat Shamir, A. (1985). Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO 84 on advances in cryptology (pp. 47–53). Springer. Shamir, A. (1985). Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO 84 on advances in cryptology (pp. 47–53). Springer.
3.
Zurück zum Zitat Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In Advances in cryptology—CRYPTO 2001 (Vol. 32, pp. 213–229). Springer. doi:10.1137/S0097539701398521. Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In Advances in cryptologyCRYPTO 2001 (Vol. 32, pp. 213–229). Springer. doi:10.​1137/​S009753970139852​1.
4.
Zurück zum Zitat Gentry, C., Peikert, C., & Vaikuntanathan, V. (2008). Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of the fortieth annual ACM symposium on Theory of computing (pp. 197–206). ACM. doi:10.1145/1374376.1374407. Gentry, C., Peikert, C., & Vaikuntanathan, V. (2008). Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of the fortieth annual ACM symposium on Theory of computing (pp. 197–206). ACM. doi:10.​1145/​1374376.​1374407.
6.
Zurück zum Zitat Eslami, Z., Noroozi, M., & Rad, S. K. (2016). Provably secure group key exchange protocol in the presence of dishonest insiders. International Journal of Network Security, 18(1), 33–42. Eslami, Z., Noroozi, M., & Rad, S. K. (2016). Provably secure group key exchange protocol in the presence of dishonest insiders. International Journal of Network Security, 18(1), 33–42.
8.
Zurück zum Zitat Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In Advances in cryptology—ASIACRYPT 2003 (pp. 452–473). Springer. doi:10.1007/978-3-540-40061-5. Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In Advances in cryptologyASIACRYPT 2003 (pp. 452–473). Springer. doi:10.​1007/​978-3-540-40061-5.
13.
Zurück zum Zitat Vallent, T. F., & Kim, H. (2013). Three factor authentication protocol based on bilinear pairing. In Multimedia and ubiquitous engineering (pp. 253–259). Springer. doi:10.1007/978-3-642-54900-7. Vallent, T. F., & Kim, H. (2013). Three factor authentication protocol based on bilinear pairing. In Multimedia and ubiquitous engineering (pp. 253–259). Springer. doi:10.​1007/​978-3-642-54900-7.
14.
Zurück zum Zitat Hsu, C.-L., Chuang, Y.-H., & Kuo, C. (2015). A novel remote user authentication scheme from bilinear pairings via internet. Wireless Personal Communications, 83(1), 163–174. doi:10.1007/s11277-015-2386-2.CrossRef Hsu, C.-L., Chuang, Y.-H., & Kuo, C. (2015). A novel remote user authentication scheme from bilinear pairings via internet. Wireless Personal Communications, 83(1), 163–174. doi:10.​1007/​s11277-015-2386-2.CrossRef
15.
Zurück zum Zitat Luo, M., & Zhao, H. (2015). An authentication and key agreement mechanism for multi-domain wireless networks using certificateless public-key cryptography. Wireless Personal Communications, 81(2), 779–798. doi:10.1007/s11277-014-2157-5.CrossRef Luo, M., & Zhao, H. (2015). An authentication and key agreement mechanism for multi-domain wireless networks using certificateless public-key cryptography. Wireless Personal Communications, 81(2), 779–798. doi:10.​1007/​s11277-014-2157-5.CrossRef
16.
Zurück zum Zitat Tsai, J.-L., & Lo, N.-W. (2015). Provably secure and efficient anonymous ID-based authentication protocol for mobile devices using bilinear pairings. Wireless Personal Communications, 83(2), 1273–1286. doi:10.1007/s11277-015-2449-4.CrossRef Tsai, J.-L., & Lo, N.-W. (2015). Provably secure and efficient anonymous ID-based authentication protocol for mobile devices using bilinear pairings. Wireless Personal Communications, 83(2), 1273–1286. doi:10.​1007/​s11277-015-2449-4.CrossRef
18.
Zurück zum Zitat Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1), 18–36.CrossRefMATH Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1), 18–36.CrossRefMATH
19.
Zurück zum Zitat Cremers, C., Mauw, S., & de Vink, E. (2003). Formal methods for security protocols: Three examples of the black-box approach. NVTI Newsletter, 7, 21–32. Cremers, C., Mauw, S., & de Vink, E. (2003). Formal methods for security protocols: Three examples of the black-box approach. NVTI Newsletter, 7, 21–32.
21.
Zurück zum Zitat Armando, A., Basin, D., Boichut, Y., Chevalier, Y., & Compagna, L. (2005). The AVISPA tool for the automated validation of internet security protocols and applications. In Computer aided verification (pp. 281–285). Springer. Armando, A., Basin, D., Boichut, Y., Chevalier, Y., & Compagna, L. (2005). The AVISPA tool for the automated validation of internet security protocols and applications. In Computer aided verification (pp. 281–285). Springer.
22.
Zurück zum Zitat Ziauddin, S., & Martin, B. (2013). Formal analysis of ISO/IEC 9798-2 authentication standard using AVISPA. In 2013 eighth Asia joint conference on information security (pp. 108–114). IEEE. doi:10.1109/ASIAJCIS.2013.25. Ziauddin, S., & Martin, B. (2013). Formal analysis of ISO/IEC 9798-2 authentication standard using AVISPA. In 2013 eighth Asia joint conference on information security (pp. 108–114). IEEE. doi:10.​1109/​ASIAJCIS.​2013.​25.
23.
Zurück zum Zitat Hernandez-Ardieta, J. L., Gonzalez-tablas, A. I., & Ramos, B. (2009). Formal validation of OFEPSP + with AVISPA. In Foundations and applications of security analysis (pp. 124–137). Springer. Hernandez-Ardieta, J. L., Gonzalez-tablas, A. I., & Ramos, B. (2009). Formal validation of OFEPSP + with AVISPA. In Foundations and applications of security analysis (pp. 124–137). Springer.
26.
Zurück zum Zitat Barreto, P. S., Kim, H. Y., Lynn, B., & Scott, M. (2002). Efficient algorithms for pairing-based cryptosystems. In Advances in cryptology—CRYPTO 2002 (pp. 354–369). Springer. Barreto, P. S., Kim, H. Y., Lynn, B., & Scott, M. (2002). Efficient algorithms for pairing-based cryptosystems. In Advances in cryptologyCRYPTO 2002 (pp. 354–369). Springer.
27.
Zurück zum Zitat Hafizul, S. K., & Biswas, I. G. P. (2015). Design of two-party authenticated key agreement protocol based on ECC and self-certified public keys. Wireless Personal Communications, 82(4), 2727–2750. doi:10.1007/s11277-015-2375-5.CrossRef Hafizul, S. K., & Biswas, I. G. P. (2015). Design of two-party authenticated key agreement protocol based on ECC and self-certified public keys. Wireless Personal Communications, 82(4), 2727–2750. doi:10.​1007/​s11277-015-2375-5.CrossRef
28.
Zurück zum Zitat Dolev, D., & Yao, A. C. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198–208.MathSciNetCrossRefMATH Dolev, D., & Yao, A. C. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198–208.MathSciNetCrossRefMATH
Metadaten
Titel
A New Certificateless and Secure Authentication Scheme for Ad hoc Networks
verfasst von
Shaghayegh Bakhtiari-Chehelcheshmeh
Mehdi Hosseinzadeh
Publikationsdatum
12.10.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3721-y

Weitere Artikel der Ausgabe 4/2017

Wireless Personal Communications 4/2017 Zur Ausgabe

Neuer Inhalt