Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless Encryption

Establishing secure communication in a wireless network such as Mobile Ad Hoc Network is particularly challenging because: (i) the network is self-organizing; (ii) messages are broadcasted; (iii) messages travel in a hopby- hop manner; (iv) nodes are constrained in terms of computation and battery power. We propose an efficient Certificateless Encryption scheme which is optimized for Optimized Link State Routing based Mobile Ad Hoc Network environment. Further, we couple the idea of Resurrecting Duckling with the scheme to achieve efficient key establishment. We also show the security of the scheme in random oracle model assuming k -Bilinear Diffie-Hellman Inversion problem is hard.

[1]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[2]  A. Miyaji,et al.  New Explicit Conditions of Elliptic Curve Traces for FR-Reduction , 2001 .

[3]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[4]  Haiyun Luo,et al.  Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.

[5]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[6]  Masao Kasahara,et al.  ID based Cryptosystems with Pairing on Elliptic Curve , 2003, IACR Cryptol. ePrint Arch..

[7]  Ali Miri,et al.  Efficient identity-based security schemes for ad hoc network routing protocols , 2004, Ad Hoc Networks.

[8]  Liqun Chen,et al.  Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme , 2005, IMACC.

[9]  Yuguang Fang,et al.  AC-PKI: anonymous and certificateless public-key infrastructure for mobile ad hoc networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[10]  Jean-Jacques Quisquater,et al.  On Constructing Certificateless Cryptosystems from Identity Based Encryption , 2006, Public Key Cryptography.

[11]  Jianping Pan,et al.  Identity-based secure collaboration in wireless ad hoc networks , 2007, Comput. Networks.

[12]  Yi Mu,et al.  Malicious KGC attacks in certificateless cryptography , 2007, ASIACCS '07.

[13]  Joonsang Baek,et al.  Strongly Secure Certificateless Public Key Encryption Without Pairing , 2007, CANS.