CAKA: a novel certificateless-based cross-domain authenticated key agreement protocol for wireless mesh networks

Abstract Due to the flexibility of wireless mesh networks (WMNs) to form the backhaul subnetworks, future generation networks may have to integrate various kinds of WMNs under possibly various administrative domains. Aiming at establishing secure access and communications among the communication entities in a multi-domain WMN environment, in this paper, we intend to address the cross-domain authentication and key agreement problem. We present a light-weight cross-domain authentication and key agreement protocol, namely CAKA, under certificateless-based public key cryptosystem. CAKA has a few attractive features. First, mutual authentication and key agreement between any pair of users from different WMN domains can be easily achieved with two-round interactions. Second, no central domain authentication server is required and fast authentication for various roaming scenarios is supported by using a repeated cross-domain algorithm. Third, no revocation and renewal of certificates and key escrow are needed. Finally, it provides relatively more security features without increasing too much overhead of computation and storage. Our analysis shows that the proposed CAKA protocol is highly efficient in terms of communication overhead and resilient to various kinds of attacks.

[1]  Bing He,et al.  An identity-based authentication and key establishment scheme for multi-operator maintained Wireless Mesh Networks , 2010, The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010).

[2]  Zhenfu Cao,et al.  An improved identity-based key agreement protocol and its security proof , 2009, Inf. Sci..

[3]  Yuguang Fang,et al.  How to secure multi-domain wireless mesh networks , 2010, Wirel. Networks.

[4]  Josep Domingo-Ferrer,et al.  Simulatable certificateless two-party authenticated key agreement protocol , 2010, Inf. Sci..

[5]  Tianhan Gao,et al.  Delegation-Based Mutual Authentication Scheme for Multi-operator Wireless Mesh Network , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[6]  Hoon Wei Lim,et al.  Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[7]  Zhoujun Li,et al.  Provably secure identity-based authenticated key agreement protocols with malicious private key generators , 2011, Inf. Sci..

[8]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[9]  Uyen Trang Nguyen,et al.  Fast authentication for mobile clients in wireless mesh networks , 2010, CCECE 2010.

[10]  Richard Comley,et al.  Efficient Certificateless Public Key Encryption , 2005, IACR Cryptol. ePrint Arch..

[11]  Jianhua Li,et al.  Two-party authenticated key agreement in certificateless public key cryptography , 2006, Wuhan University Journal of Natural Sciences.

[12]  Duncan S. Wong,et al.  Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.

[13]  Yuguang Fang,et al.  ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks , 2006, IEEE Journal on Selected Areas in Communications.

[14]  Wenjing Lou,et al.  PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.

[15]  Hui Li,et al.  Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks , 2014, IEEE Transactions on Vehicular Technology.

[16]  Wenjing Lou,et al.  A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[17]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[18]  Li Jianhua,et al.  Two-party authenticated key agreement in certificateless public key cryptography , 2007 .

[19]  Guomin Yang,et al.  Cross-domain password-based authenticated key exchange revisited , 2013, 2013 Proceedings IEEE INFOCOM.

[20]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[21]  Zhenfu Cao,et al.  Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode , 2009, Science in China Series F: Information Sciences.

[22]  Sin Ban Ho,et al.  An enhanced certificateless authenticated key agreement protocol , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).

[23]  Kyung-Ah Shim Efficient ID-based authenticated key agreement protocol based on Weil pairing , 2003 .