Time-assisted authentication protocol

被引:5
作者
Bilal, Muhammad [1 ]
Kang, Shin-Gak [1 ]
机构
[1] Univ Sci & Technol, Elect & Telecommun Res Inst, Daejeon, South Korea
关键词
authentication; CSP; key distribution; network security; rank functions; NETWORKS;
D O I
10.1002/dac.3309
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Authentication is the first step toward establishing a service provider and customer association. In a mobile network environment, a lightweight and secure authentication protocol is one of the most significant factors to enhance the degree of service persistence. This work presents a secure and lightweight keying and authentication protocol suite termed time-assisted authentication protocol (TAP). The TAP improves the security of protocols with the assistance of time-based encryption keys and scales down the authentication complexity by issuing a reauthentication ticket. While moving across the network, a mobile customer node sends a reauthentication ticket to establish new sessions with service-providing nodes. Consequently, this reduces the communication and computational complexity of the authentication process. In the keying protocol suite, a key distributor controls the key generation arguments and time factors, while other participants independently generate a keychain based on key generation arguments. We undertake a rigorous security analysis and prove the security strength of TAP using communicating sequential processes and rank function analysis.
引用
收藏
页数:16
相关论文
共 28 条
[11]  
Kirsal Y, CHAPTER GLOBAL SECUR, V45, P56
[12]   Multifold node authentication in mobile ad hoc networks [J].
Komninos, Nikos ;
Vergados, Dimitrios D. ;
Douligeris, Christos .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2007, 20 (12) :1391-1406
[13]  
Kukec A, 2007, 29 INT C INF TECHN I
[14]  
Lin H., 2014, INT J COMMUNICATION
[15]  
LOWE G, 1997, P 10 COMP SEC FDN WO
[16]  
Misra S. C., 2014, INT J COMMUNICATION
[17]  
Nguyen KT, 2015, AD HOC NETW, P32
[18]  
Perrig Adrian, 2002, RSA CRYPTOBYTES
[19]  
RAFAELI S, 2003, ACM COMPUTING SURVEY, V35
[20]  
Ryan P., 2000, MODELLING ANAL SECUR, Vfirst