An efficient session key generation for NTDR networks based on bilinear paring

Near-term digital radio (NTDR) network is a kind of MANET in which mobile nodes are assigned into different clusters. Therefore, it can let the nodes to communicate with each other efficiently in a large area. Despite several NTDR protocols have been proposed, there still lacks an efficient secure one. Accordingly, in this paper, we propose a new method based on ID-based bilinear pairings to overcome the unsolved security problems nowadays. After our analysis, we conclude that our scheme is the first protocol for NTDR network that is not only secure but also very efficient.

[1]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[2]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[3]  Hung-Yu Chien,et al.  Improved ID-based security framework for ad hoc network , 2008, Ad Hoc Networks.

[4]  Jeong Hyun Yi,et al.  Robust self-keying mobile ad hoc networks , 2007, Comput. Networks.

[5]  Nigel P. Smart,et al.  An Identity Based Authentication Key Agreement Protocol Based on Pairing , 2002 .

[6]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[7]  Chin-Chen Chang,et al.  DH-based communication method for cluster-based ad hoc networks , 2005, 2005 2nd Asia Pacific Conference on Mobile Technology, Applications and Systems.

[8]  Andreas Enge,et al.  Provably secure non-interactive key distribution based on pairings , 2006, Discret. Appl. Math..

[9]  G. Frey,et al.  A remark concerning m -divisibility and the discrete logarithm in the divisor class group of curves , 1994 .

[10]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[11]  Hung-Yu Chien,et al.  Identity-based key agreement protocol for mobile ad-hoc networks using bilinear pairing , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[12]  Paulo S. L. M. Barreto,et al.  Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.

[13]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[14]  Eric Thompson MD5 collisions and the impact on computer forensics , 2005, Digit. Investig..

[15]  J. Chandra,et al.  A cluster based security model for mobile ad hoc networks , 2005, 2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005..

[16]  Antoine Joux A One Round Protocol for Tripartite Diffie-Hellman , 2000, ANTS.

[17]  Leonard Barolli,et al.  Secure emergency communication of cellular phones in ad hoc mode , 2007, Ad Hoc Networks.

[18]  Yuguang Fang,et al.  Access control in wireless sensor networks , 2007, Ad Hoc Networks.

[19]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[20]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[21]  Dong Hoon Lee,et al.  ID-based Authenticated Key Agreement for Low-Power Mobile Devices , 2005, ACISP.

[22]  Vijay Varadharajan,et al.  Security for cluster based ad hoc networks , 2004, Comput. Commun..

[23]  Nigel P. Smart,et al.  AN IDENTITY BASED AUTHENTICATED KEY AGREEMENT PROTOCOL BASED ON THE WEIL PAIRING , 2001 .

[24]  Hyunsoo Yoon,et al.  On-demand secure routing protocol for ad hoc network using ID based cryptosystem , 2003, Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies.

[25]  Steven D. Galbraith,et al.  Implementing the Tate Pairing , 2002, ANTS.

[26]  Alfred Menezes,et al.  Reducing elliptic curve logarithms to logarithms in a finite field , 1993, IEEE Trans. Inf. Theory.

[27]  Paulo S. L. M. Barreto,et al.  Efficient Implementation of Pairing-Based Cryptosystems , 2004, Journal of Cryptology.

[28]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[29]  Chin-Chen Chang,et al.  Secure communications for cluster-based ad hoc networks using node identities , 2007, J. Netw. Comput. Appl..

[30]  Chien-Chih Wang,et al.  Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings , 2008, Comput. Electr. Eng..

[31]  R. Ruppe,et al.  Near Term Digital Radio (NTDR) system , 1997, MILCOM 97 MILCOM 97 Proceedings.

[32]  Xiaofeng Chen,et al.  Attack on an ID-based authenticated group key agreement scheme from PKC 2004 , 2004, Inf. Process. Lett..

[33]  Kyung-Ah Shim,et al.  Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings , 2005, Appl. Math. Comput..

[34]  Alfred Menezes,et al.  The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..

[35]  Kenneth G. Paterson,et al.  ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..

[36]  C. Popescu,et al.  A Secure Authenticated Key Agreement Protocol , 2022 .