An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET

Mobile Ad hoc Network (MANET) is a matter of great concern and an emerging research field of ubiquitous computing. Nowadays, security issues regarding MANETs are gaining remarkable research interest. MANET is more vulnerable to the security attacks by resource constraints. An ID based cryptography allows an user to generate their public keys without exchanging any certificates. In above scheme, public/private key can be construct without exchanging any certificate. The idea of bilinear pairings make the system efficient and easy to providing basic security. In order to provide secure communication in MANET, many researchers used different schemes to provide authentication. However, existing techniques have drawbacks such as forgery on adaptive chosen plain text message and back secrecy in traditional authentication schemes. In this paper, we work on an ID based signature scheme for achieving reliability and secure authentication in MANET. We show that proposed id based signature scheme is secure against forgery attack in the random oracle model under the Inverse-Computational Diffie-Hellman Problem (Inv-CDHP) assumption. Proposed scheme is more efficient in term of computation than other traditional schemes.

[1]  Reihaneh Safavi-Naini,et al.  An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.

[2]  Karim Konate,et al.  Attacks Analysis in Mobile Ad Hoc Networks: Modeling and Simulation , 2011, 2011 Second International Conference on Intelligent Systems, Modelling and Simulation.

[3]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[4]  Huaqun Wang,et al.  Identity-Based Strong Key-Insulated Ring Signature Scheme in the Standard Model , 2011, 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks.

[5]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[6]  Sahadeo Padhye,et al.  An ID-based signature scheme from bilinear pairing based on k-plus problem , 2011 .

[7]  Mike Burmester,et al.  On the Security of Route Discovery in MANETs , 2009, IEEE Transactions on Mobile Computing.

[8]  Jiankun Hu,et al.  A mutual-healing key distribution scheme in wireless sensor networks , 2011, J. Netw. Comput. Appl..

[9]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[10]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[11]  Jiankun Hu,et al.  Self-Healing Key Distribution Schemes for Wireless Networks: A Survey , 2011, Comput. J..

[12]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[13]  Yongguang Zhang,et al.  Security in Mobile Ad-Hoc Networks , 2005 .

[14]  N. Asokan,et al.  Securing ad hoc routing protocols , 2002, WiSE '02.

[15]  Christof Paar,et al.  On digital signatures in ad hoc networks , 2005, Eur. Trans. Telecommun..

[16]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.