| Literature DB >> 26184224 |
Huifang Chen1,2, Linlin Ge3, Lei Xie4,5.
Abstract
The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.Entities:
Keywords: elliptic curves cryptography (ECC); self-certified public key (SCPK); session key agreement; user authentication; wireless ad hoc network (WANET)
Year: 2015 PMID: 26184224 PMCID: PMC4541922 DOI: 10.3390/s150717057
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The system architecture of the proposed user authentication scheme in a wireless ad hoc network (WANET).
Notations and their denotations.
| Notations | Denotations |
|---|---|
| A large prime number | |
| GF( | The finite field |
| The elliptic curve parameters, real numbers | |
| The elliptic curve over GF( | |
| A base point ( | |
| The order of point | |
| A one-way hash function | |
| The private key of CA | |
| The public key of CA | |
| A nonce randomly generated by CA from [2, | |
| A nonce randomly generated by Ui from [2, | |
| The private key of Ui | |
| The public key of Ui | |
| The identity of Ui | |
| The signature of Ui | |
| The massage integrity code of the message generated by Ui | |
| ⊕ | The simple exclusive-OR operation |
| || | The message concatenation operation |
Figure 2The user registration phase.
Figure 3The user authentication phase.
Figure 4The proposed user authentication scheme.
The functionality comparison.
| Functionality | DHKA Scheme in [ | SecureMAC Protocol in [ | AKA Scheme in [ | Proposed Scheme |
|---|---|---|---|---|
| Mutual trust | Yes | Yes | Yes |
|
| Session key agreement | Yes | No | Yes |
|
| Time synchronization | Not need | Not need | Need |
|
| Replay attack resistance | No | Yes | Yes |
|
| Man-in-the middle attack resistance | Yes | Yes | Yes |
|
| Forward secrecy | No | No | Yes |
|
| Backward secrecy | No | No | Yes |
|
| Key compromise impersonation attack resistance | No | No | No |
|
Storage overhead of each user.
| Parameters | Storage Overhead (bits) |
|---|---|
| The parameters of ECC, ( | 960/(160 + 160 + 160 + 320 + 160) |
| CA’s public key, | 320 |
| Point | 320 |
| User identity, | 160 |
| User’s private key, | 160 |
| User’s public key, | 320 |
|
|
|
Communication overhead of each user.
| Message | Communication Overhead (bits) |
|---|---|
| Step 1 | 1184 |
| Step 2 | 1344 |
| Step 3 | 640 |
|
|
|
Definition of various operations.
| Notations | Denotations |
|---|---|
| The time for computing a point multiplication on
| |
| The time for computing a point addition on
| |
| The time for computing a bilinear pairing | |
| The time for computing modular inversion | |
| The time for computing modular multiplication | |
| The time for computing modular addition | |
| The time for computing modular exponentiation | |
| The time for computing the one-way hash function | |
| The time for computing RSA signature verification operation | |
| The time for computing symmetric encryption/decryption operation |
Computation overhead of each user.
| Schemes | Computation Overhead | Equivalent Computation Overhead |
|---|---|---|
| DHKA scheme in [ | ||
| AKA scheme in [ | ||
| TSMKM scheme in [ | ||
| BP-A scheme in [ |
| |
| ECC-AKA scheme in [ | ||
| ECC-IAKA scheme in [ | ||
|
|