A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks

被引:11
作者
Chen, Huifang [1 ,2 ]
Ge, Linlin [1 ]
Xie, Lei [1 ,2 ]
机构
[1] Zhejiang Univ, Dept Informat Sci & Elect Engn, Hangzhou 310027, Zhejiang, Peoples R China
[2] Zhejiang Prov Key Lab Informat Network Technol, Hangzhou 310027, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
wireless ad hoc network (WANET); self-certified public key (SCPK); elliptic curves cryptography (ECC); user authentication; session key agreement;
D O I
10.3390/s150717057
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.
引用
收藏
页码:17057 / 17075
页数:19
相关论文
共 25 条
[1]  
Alhakami Wajdi, 2013, 2013 Science and Information Conference (SAI), P796
[2]  
Ammayappan Kavitha, 2011, Journal of Computers, V6, P2408, DOI 10.4304/jcp.6.11.2408-2416
[3]   Achieving Key Privacy and Invisibility for Unattended Wireless Sensor Networks in Healthcare [J].
Babamir, Faezeh Sadat ;
Norouzi, Ali .
COMPUTER JOURNAL, 2014, 57 (04) :624-635
[4]  
Bechler M, 2004, IEEE INFOCOM SER, P2393
[5]  
Daniel R.L.B., 2012, STANDARDS EFFICIENT
[6]  
Deng HM, 2004, ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, P107
[7]  
GIRAULT M, 1991, LECT NOTES COMPUT SC, V547, P490
[8]   A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC [J].
Giruka, Venkata C. ;
Chakrabarti, Saikat ;
Singhal, Mukesh .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2006, 66 (07) :959-970
[9]   An improved two-party identity-based authenticated key agreement protocol using pairings [J].
Hoelbl, Marko ;
Welzer, Tatjana ;
Brumen, Bostjan .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (01) :142-150
[10]   A time stamp-based elliptic curve cryptosystem for wireless ad-hoc sensor networks [J].
Indra, Gaurav ;
Taneja, Renu .
INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2014, 4 (01) :39-54