KDFBA: key distribution through fingerprint based authentication using Mobile agent

被引:1
作者
Kumar, Umesh [1 ]
Gambhir, Sapna [1 ]
机构
[1] JC Bose Univ Sci & Technol YMCA, Dept Comp Engn, Faridabad, Haryana, India
关键词
Wireless network; Key exchange; Black hole attack; Authentication; KDC; Mobile agent; Wireless security; SECURE; SCHEME; MANAGEMENT;
D O I
10.1007/s11042-020-08614-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As mobile networks and use of mobile devices are increasing at a rapid rate, need of securing both the device information and the network increasing evermore. Authentication of the user is another important challenge as this need to be done remotely. Bio-cryptography is one of the robust solution, which uses existing cryptography techniques with user biometric information for encryption and authentication. Encryption process also involves key generation and distribution. Key Distribution Center (KDC) is the most common mode of key generation and key distribution. KDC is always been the most profitable and worthy target for the adversaries. When KDC is compromised the strongest security protocols, encryption protocols, firewalls etc. will be of no use and will backfire. This paper explains some of the currently existing approaches of key exchange and problems in existing approaches are identified. A new biometric based key exchange protocol (KDFBA) is proposed which makes use of the mobile agent for key exchange and biometric information for authentication. Proposed protocol is simulated on NS2 platform and is also compared with the existing approaches. Protocol is tested against some parameters like traffic generated, timing analysis and prevention against attacks like black hole attack. The simulation results prove that the proposed key exchange protocol reduces the traffic on the network considerably and also prevents attacks like black hole.
引用
收藏
页码:13891 / 13918
页数:28
相关论文
共 35 条
  • [1] Securing DSR with mobile agents in wireless ad hoc networks
    Abosamra, Ahmed
    Hashem, Mohamed
    Darwish, Gamal
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2011, 12 (01) : 29 - 36
  • [2] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [3] [Anonymous], P 2 ACM INT C WIR SE
  • [4] Key-management scheme for wireless sensor networks based on merging blocks of symmetric design
    Anzani, Mohaddese
    Javadi, Hamid Haj Seyyed
    Modirir, Vahid
    [J]. WIRELESS NETWORKS, 2018, 24 (08) : 2867 - 2879
  • [5] Blundo C., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P387
  • [6] Perfectly secure key distribution for dynamic conferences
    Blundo, C
    De Santis, A
    [J]. INFORMATION AND COMPUTATION, 1998, 146 (01) : 1 - 23
  • [7] Chatterjee K, 2012, LECT NOTES COMPUT SC, V7332, P351, DOI 10.1007/978-3-642-31020-1_41
  • [8] CHATTERJEE U, 2018, IEEE T DEPEND SECURE, P1
  • [9] A unified model for unconditionally secure key distribution
    Cimato, Stelvio
    Cresti, Antonella
    D'Arco, Paolo
    [J]. JOURNAL OF COMPUTER SECURITY, 2006, 14 (01) : 45 - 64
  • [10] Host mobility key management in dynamic secure group communication
    Daghighi, Babak
    Kiah, Miss Laiha Mat
    Iqbal, Salman
    Rehman, Muhammad Habib Ur
    Martin, Keith
    [J]. WIRELESS NETWORKS, 2018, 24 (08) : 3009 - 3027