| Literature DB >> 26751454 |
Francisco Martín-Fernández1, Pino Caballero-Gil2, Cándido Caballero-Gil3.
Abstract
This paper describes the design and analysis of a new scheme for the authenticated exchange of confidential information in insecure environments within the Internet of Things, which allows a receiver of a message to authenticate the sender and compute a secret key shared with it. The proposal is based on the concept of a non-interactive zero-knowledge proof, so that in a single communication, relevant data may be inferred to verify the legitimacy of the sender. Besides, the new scheme uses the idea under the Diffie-Hellman protocol for the establishment of a shared secret key. The proposal has been fully developed for platforms built on the Android Open Source Project, so it can be used in any device or sensor with this operating system. This work provides a performance study of the implementation and a comparison between its promising results and others obtained with similar schemes.Entities:
Keywords: authentication; mobile ad hoc network; non-interactive zero-knowledge proof
Year: 2016 PMID: 26751454 PMCID: PMC4732108 DOI: 10.3390/s16010075
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Proposal parameters.
| Notation | Meaning |
|---|---|
| Graph known by all legitimate nodes, on which they know how to solve a hard problem | |
| Solution to the hard problem in | |
| Number of challenges | |
| Isomorphism between | |
| Cryptographic hash function | |
| Least significant bit of an input string | |
| Symmetric encryption with key | |
| Contribution of a node to the session key |
Figure 1Components of sent messages.
Figure 2Flowchart of the proposed algorithm.
Figure 3Types of MANET nodes.
Figure 4Android application screenshot.
Figure 5Segment size trend.
Figure 6Segment generation time trend
Figure 7Segment processing time trend.
Comparative data: time (ms) and size (bytes).
| Conf1. [ | Conf2. [ | Conf3. [ | Conf4. [ | Our Scheme | ||
|---|---|---|---|---|---|---|
| 10 Challenges | Time | 469 | 1302 | 484 | 1522 | 454 |
| 100 Challenges | Time | 3422 | 8070 | 3703 | 9824 | 5665 |
Password authenticated key (PAK) scheme vs. the proposed scheme.
| PAK Scheme | Our Scheme | |
|---|---|---|
| Time (ms) | Challenges | Time (ms) |
| 197 | 3 | 86 |
| 4 | 112 | |
| 5 | 153 | |
| 6 | 176 | |
| 7 | 195 | |
| 8 | 221 | |