A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks

The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

[1]  ChuanFu Zhang,et al.  A novel self-certified security access authentication protocol in the space network , 2012, 2012 IEEE 14th International Conference on Communication Technology.

[2]  Loren M. Kohnfelder,et al.  Towards a practical public-key cryptosystem. , 1978 .

[3]  Marc Girault,et al.  Self-Certified Public Keys , 1991, EUROCRYPT.

[4]  Marko Hölbl,et al.  An improved two-party identity-based authenticated key agreement protocol using pairings , 2012, J. Comput. Syst. Sci..

[5]  Dharma P. Agrawal,et al.  Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[6]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[7]  Atul Negi,et al.  An ECC-Based Two-Party Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks , 2011, J. Comput..

[8]  Xuemin Shen,et al.  Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks , 2006, IEEE Transactions on Wireless Communications.

[9]  Patrick Horster,et al.  Self-certified keys — Concepts and Applications , 1997 .

[10]  Jian Ma,et al.  Secure and Efficient Authentication Scheme for Mobile Sink in WSNs Based on Bilinear Pairings , 2014, Int. J. Distributed Sens. Networks.

[11]  Erich Wenger,et al.  Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography , 2013, ACNS.

[12]  Hans-Joachim Hof,et al.  A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.

[13]  Renu Taneja,et al.  A time stamp-based elliptic curve cryptosystem for wireless ad-hoc sensor networks , 2014, Int. J. Space Based Situated Comput..

[14]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[15]  Mukesh Singhal,et al.  A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC , 2006, J. Parallel Distributed Comput..

[16]  Tet Hin Yeap,et al.  A Novel Authentication and Key Agreement Scheme for Wireless Mesh Networks , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.

[17]  Ali Norouzi,et al.  Achieving Key Privacy and Invisibility for Unattended Wireless Sensor Networks in Healthcare , 2014, Comput. J..

[18]  Han-Yu Lin,et al.  Self-certified multi-proxy signature schemes with message recovery , 2009 .

[19]  Qiaoyan Wen,et al.  An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks , 2013, Int. J. Netw. Manag..

[20]  Zhu Xingliang,et al.  A new authentication scheme for Wireless Ad Hoc Network , 2012, 2012 International Conference on Information Management, Innovation Management and Industrial Engineering.

[21]  Bao Li,et al.  An Efficient Scheme for User Authentication in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[22]  Wajdi Alhakami,et al.  A secure MAC protocol for Cognitive Radio Networks (SMCRN) , 2013, 2013 Science and Information Conference.