Skip to main content

2018 | OriginalPaper | Buchkapitel

Universally Verifiable Certificateless Signcryption Scheme for MANET

verfasst von : Susmita Mandal, Sujata Mohanty, Banshidhar Majhi

Erschienen in: Proceedings of the International Conference on Microelectronics, Computing & Communication Systems

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The mobile ad hoc network (MANET) is a collection of wireless mobile nodes that communicate with one another through a standard transmission medium such as Wi-Fi, cellular, or satellite communication. However, their basic characteristics make them vulnerable against numerous attacks accordingly raising the need of security. In this paper, we propose a certificateless signcryption scheme based on the difficulty of solving the Diffie–Hellman problem. The simulation result proves that the scheme is secure against active and passive attacks using AVISPA (Automated Validation of Internet Security Protocols and Applications) tool.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat I. Chlamtac, M. Conti, J.J.N. Liu, Mobile ad hoc networking: imperatives and challenges. Ad Hoc Netw. 1(1), 13–64 (2003)CrossRef I. Chlamtac, M. Conti, J.J.N. Liu, Mobile ad hoc networking: imperatives and challenges. Ad Hoc Netw. 1(1), 13–64 (2003)CrossRef
2.
Zurück zum Zitat P.M. Jawandhiya et al., A survey of mobile ad hoc network attacks. Int. J. Eng. Sci. Technol. 2.9, 4063–4071 (2010) P.M. Jawandhiya et al., A survey of mobile ad hoc network attacks. Int. J. Eng. Sci. Technol. 2.9, 4063–4071 (2010)
3.
Zurück zum Zitat A. Shamir, Identity-based cryptosystems and signature schemes, in Advances in cryptology (Springer, Berlin Heidelberg, 1985) A. Shamir, Identity-based cryptosystems and signature schemes, in Advances in cryptology (Springer, Berlin Heidelberg, 1985)
4.
Zurück zum Zitat Y. Zhang et al., Securing mobile ad hoc networks with certificateless public keys. Dependable Secure Comput. IEEE Trans. 3(4), 386–399 (2006) Y. Zhang et al., Securing mobile ad hoc networks with certificateless public keys. Dependable Secure Comput. IEEE Trans. 3(4), 386–399 (2006)
5.
Zurück zum Zitat Z. Zhang, W. Susilo, R. Raad, Mobile ad-hoc network key management with certificateless cryptography, in 2nd International Conference on Signal Processing and Communication Systems, 2008. ICSPCS 2008 (IEEE, 2008) Z. Zhang, W. Susilo, R. Raad, Mobile ad-hoc network key management with certificateless cryptography, in 2nd International Conference on Signal Processing and Communication Systems, 2008. ICSPCS 2008 (IEEE, 2008)
6.
Zurück zum Zitat X. Boyen, Multipurpose identity-based signcryption, in Advances in Cryptology-CRYPTO 2003 (Springer, Berlin Heidelberg, 2003), pp. 383–399 X. Boyen, Multipurpose identity-based signcryption, in Advances in Cryptology-CRYPTO 2003 (Springer, Berlin Heidelberg, 2003), pp. 383–399
7.
Zurück zum Zitat L. Chen, J. Malone-Lee, Improved identity-based signcryption, in Public Key Cryptography-PKC 2005 (Springer, Berlin Heidelberg, 2005), pp. 362–379 L. Chen, J. Malone-Lee, Improved identity-based signcryption, in Public Key Cryptography-PKC 2005 (Springer, Berlin Heidelberg, 2005), pp. 362–379
8.
Zurück zum Zitat S.S. Al-Riyami, K.G. Paterson, Certificateless public key cryptography, in Advances in Cryptology-ASIACRYPT 2003 (Springer, Berlin Heidelberg, 2003), pp. 452–473 S.S. Al-Riyami, K.G. Paterson, Certificateless public key cryptography, in Advances in Cryptology-ASIACRYPT 2003 (Springer, Berlin Heidelberg, 2003), pp. 452–473
9.
Zurück zum Zitat Y. Zheng, Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption), in Advances in Cryptology—CRYPTO’97 (Springer, Berlin Heidelberg, 1997), pp. 165–179 Y. Zheng, Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption), in Advances in Cryptology—CRYPTO’97 (Springer, Berlin Heidelberg, 1997), pp. 165–179
10.
Zurück zum Zitat X. Lv, H. Li, B. Wang, Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks. Secur. Commun. Netw. 6(1), 49–57 (2013)CrossRef X. Lv, H. Li, B. Wang, Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks. Secur. Commun. Netw. 6(1), 49–57 (2013)CrossRef
11.
Zurück zum Zitat M. Barbosa, P. Farshim, Certificateless signcryption, in Proceedings of the 2008 ACM symposium on Information, computer and communications security (ACM, 2008) M. Barbosa, P. Farshim, Certificateless signcryption, in Proceedings of the 2008 ACM symposium on Information, computer and communications security (ACM, 2008)
12.
Zurück zum Zitat W.-H. Liu, C.-X. Xu, Certificateless signcryption scheme without bilinear pairing. Ruanjian Xuebao J. Softw. 22(8), 1918–1926 (2011)MathSciNetCrossRef W.-H. Liu, C.-X. Xu, Certificateless signcryption scheme without bilinear pairing. Ruanjian Xuebao J. Softw. 22(8), 1918–1926 (2011)MathSciNetCrossRef
13.
Zurück zum Zitat W. Xie, Z. Zhang, Efficient and provably secure certificateless signcryption from bilinear maps, in IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), 2010 (IEEE, 2010) W. Xie, Z. Zhang, Efficient and provably secure certificateless signcryption from bilinear maps, in IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), 2010 (IEEE, 2010)
14.
Zurück zum Zitat D-B. He, Security analysis of a certificateless signcryption scheme. Ruanjian Xuebao J. Softw. 24(3), 618–622 (2013) D-B. He, Security analysis of a certificateless signcryption scheme. Ruanjian Xuebao J. Softw. 24(3), 618–622 (2013)
15.
Zurück zum Zitat W. Shi et al., Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing. Front. Comput. Sci. 8(4), 656–666 (2014) W. Shi et al., Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing. Front. Comput. Sci. 8(4), 656–666 (2014)
16.
Zurück zum Zitat B. Wang, J. Li, (t, n) Threshold signature scheme without a trusted party. Chin. J. Comput. 26(11), 1581–1584 (2003). (Chinese Edition)MathSciNet B. Wang, J. Li, (t, n) Threshold signature scheme without a trusted party. Chin. J. Comput. 26(11), 1581–1584 (2003). (Chinese Edition)MathSciNet
17.
Zurück zum Zitat L.-C. Li, R.-S. Liu, Securing cluster-based ad hoc networks with distributed authorities. Wirel. Commun. IEEE Trans. 9(10), 3072–3081 (2010)CrossRef L.-C. Li, R.-S. Liu, Securing cluster-based ad hoc networks with distributed authorities. Wirel. Commun. IEEE Trans. 9(10), 3072–3081 (2010)CrossRef
18.
Zurück zum Zitat H. Lee et al., ID-based key management scheme using threshold decryption for OPMD environment, in IEEE International Conference on Consumer Electronics (ICCE), 2012 (IEEE, 2012) H. Lee et al., ID-based key management scheme using threshold decryption for OPMD environment, in IEEE International Conference on Consumer Electronics (ICCE), 2012 (IEEE, 2012)
19.
Zurück zum Zitat F. Miao et al., Fully self-Organized Key management scheme in MANET and its applications, in Computer Networks & Communications (NetCom) (Springer, New York, 2013), pp. 381–391 F. Miao et al., Fully self-Organized Key management scheme in MANET and its applications, in Computer Networks & Communications (NetCom) (Springer, New York, 2013), pp. 381–391
21.
Zurück zum Zitat L. Vigan, Automated security protocol analysis with the AVISPA tool. Electron. Notes Theor. Comput. Sci. 155, 61–86 (2006)CrossRef L. Vigan, Automated security protocol analysis with the AVISPA tool. Electron. Notes Theor. Comput. Sci. 155, 61–86 (2006)CrossRef
Metadaten
Titel
Universally Verifiable Certificateless Signcryption Scheme for MANET
verfasst von
Susmita Mandal
Sujata Mohanty
Banshidhar Majhi
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-5565-2_7

Neuer Inhalt