A NOVEL PROTOCOL FOR INDIRECT AUTHENTICATION IN MOBILE NETWORKS BASED ON ELLIPTIC CURVE CRYPTOGRAPHY

Unlimited mobility free of any fundamental communications is presented by Mobile Networks. In such networks, the information access between unacquainted nodes and server is a usual thing that happens frequently. This creates more chance to take the advantage of accessing information illegally by any invalid user node. The threat of apprehensive surroundings, information mishandling, etc is the eventual outcome. The fortification of classified and susceptible data in mobile networks can be done by the vital system, cryptosystem that spots the legitimacy. In such circumstances, the fundamental pre-requisite for better authentication is the performance of authentication by a middle agent, say Authentication server. Hereby, we are proposing a protocol that provides a secure transfer of information between the both unaccustomed parties. The most common public-key cryptographic scheme, elliptic curve cryptography is exploited to devise the protocol. Subsequently, the mobile networks employ the protocol for the authentication of user node. As the protocol utilizes the elliptic curve cryptography, it offers security more than enough with a reasonable key length. Hence the protocol develops an environment in which the user node which is unfamiliar to the Main server can transfer information without any eavesdropping of unauthenticated nodes.

[1]  Vijay K. Garg,et al.  Wireless and Personal Communications Systems , 2000 .

[2]  Vipul Gupta,et al.  Speeding up Secure Web Transactions Using Elliptic Curve Cryptography , 2004, NDSS.

[3]  Dharmendra Sharma,et al.  Quantum Key Distribution for Wi-Fi Network Security , 2008 .

[4]  张友坤,et al.  A Security Architecture for Mobile Ad Hoc Networks , 2005 .

[5]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[6]  Hala ElAarag,et al.  Improving TCP performance over mobile networks , 2002, CSUR.

[7]  Kenji Takahashi,et al.  Implementing identity provider on mobile phone , 2007, DIM '07.

[8]  Chris McDonald,et al.  Kerberos Assisted Authentication in Mobile Ad-hoc Networks , 2004, ACSC.

[9]  K. Thilagavathi,et al.  An Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Mobile Networks , 2009 .

[10]  Michele Bugliesi,et al.  Principles for Entity Authentication , 2003, Ershov Memorial Conference.

[11]  Armando Fox,et al.  Security on the move: indirect authentication using Kerberos , 1996, MobiCom '96.

[12]  Ibrahim Sogukpinar,et al.  SIP Authentication Scheme using ECDH , 2007 .

[13]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[14]  V. Vijayalakshmi,et al.  Secure Localization Using Elliptic Curve Cryptography in Wireless Sensor Networks , 2008 .

[15]  Vipul Gupta,et al.  Integrating elliptic curve cryptography into the web's security infrastructure , 2004, WWW Alt. '04.

[16]  Manuel Barbosa,et al.  Compiler Assisted Elliptic Curve Cryptography , 2007, IACR Cryptol. ePrint Arch..

[17]  Alfred Menezes,et al.  Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.

[18]  Sehyun Park,et al.  Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications , 2003, ACISP.

[19]  Vivek Kapoor,et al.  Elliptic curve cryptography , 2008, UBIQ.

[20]  Gunter Saake,et al.  User authentication in multidatabase systems , 1998, Proceedings Ninth International Workshop on Database and Expert Systems Applications (Cat. No.98EX130).

[21]  N. Koblitz A Course in Number Theory and Cryptography , 1987 .

[22]  Sufian Yousef,et al.  Analytical model for authentication transmission overhead between entities in mobile networks , 2007, Comput. Commun..