SECURE COMMUNICATION IN MOBILE AD HOC NETWORK USING EFFICIENT CERTIFICATELESS ENCRYPTION
Peter Hyun-Jeen Lee, Shivaramakrishnan Narayan, Parampalli Udaya
2008
Abstract
Establishing secure communication in a wireless network such as Mobile Ad Hoc Network (MANET) is particularly challenging because: (i) the network is self-organizing; (ii) messages are broadcasted; (iii) messages travel in a hop-by-hop manner; (iv) nodes are constrained in terms of computation and battery power. We propose a flexible and efficient Certificateless Encryption scheme which is optimized for MANET environment. Further, we couple the idea of Resurrecting Duckling with the scheme to achieve efficient key establishment and demonstrate the use of the transparent policy encoder which facilitates the authentication. We also show the security of the scheme in random oracle model assuming k-Bilinear Diffie-Hellman Inversion problem is hard.
References
- Abdul-Rahman, A. (1997). The pgp trust model. edi- forum, april 1997. http://www.cs.ucl.ac.uk/staff/F.AbdulRahman/docs/.
- Al-Riyami, S. and Paterson, K. (2003). Certificateless public key cryptography. In Advances in Cryptology - ASIACRYPT 2003, pages 452-473. Springer-Verlag.
- Au, M. H., Mu, Y., Chen, J., Wong, D. S., Liu, J. K., and Yang, G. (2007). Malicious kgc attacks in certificateless cryptography. In ASIACCS 7807: Proceedings of the 2nd ACM symposium on Information, computer and communications security, pages 302-311. ACM.
- Bohio, M. and Miri, A. (2004). Efficient identity-based security schemes for ad hoc network routing protocols. Journal of Ad Hoc Networks.
- Boneh, D. and Franklin, M. K. (2001). Identity-based encryption from the weil pairing. In CRYPTO 7801: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pages 213- 229. Springer-Verlag.
- Chen, L. and Cheng, Z. (2005). Security proof of the sakai-kasahara's identity-based encryption scheme. In Cryptography and Coding, pages 442-459. SpringerVerlag.
- Fujisaki, E. and Okamoto, T. (1999). Secure integration of asymmetric and symmetric encryption schemes. In CRYPTO 7899: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, pages 537-554. Springer-Verlag.
- Libert, B. and Quisquater, J. J. (2006). On constructing certificateless cryptosystems from identity based encryption. In Public Key Cryptography - PKC 2006, volume 3958 of Lecture Notes in Computer Science, pages 474-490. Springer-Verlag.
- Luo, H., Zerfos, P., Kong, J., Lu, S., and Zhang, L. (2002). Self-securing ad hoc wireless networks. In ISCC 7802: Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02), page 567. IEEE Computer Society.
- Miyaji, A., Nakabayashi, M., and Takano, S. (2001). New explicit conditions of elliptic curve traces for frreduction. In IEICE Transactions on Fundamentals, volume E84-A, pages 1234-1243.
- Pan, J., Cai, L., Shen, X. S., and Mark, J. W. (2007). Identity-based secure collaboration in wireless ad hoc networks. Comput. Networks, 51(3):853-865.
- Sakai, R. and Kasahara, M. (2003). Id based cryptosystems with pairing on elliptic curve. In 2003 Symposium on Cryptography and Information Security - SCIS'2003, Hamamatsu, Japan, 2003. http://eprint.iacr.org/2003/054.
- Stajano, F. and Anderson, R. J. (2000). The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proceedings of the 7th International Workshop on Security Protocols, pages 172-194. SpringerVerlag.
- Y. Sun, F. Z. and Baek, J. (2007). Strongly secure certificateless public key encryption without pairing. In Cryptology and Network Security, volume 4856, pages 194-208. Springer-Verlag.
- Zhang, Y., Liu, W., Lou, W., Fang, Y., and Kwon, Y. (2005). Ac-pki: anonymous and certificateless public-key infrastructure for mobile ad hoc networks. In ICC 2005: 2005 IEEE International Conference on Communications, pages 3515-3519. IEEE.
Paper Citation
in Harvard Style
Hyun-Jeen Lee P., Narayan S. and Udaya P. (2008). SECURE COMMUNICATION IN MOBILE AD HOC NETWORK USING EFFICIENT CERTIFICATELESS ENCRYPTION . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 306-311. DOI: 10.5220/0001921703060311
in Bibtex Style
@conference{secrypt08,
author={Peter Hyun-Jeen Lee and Shivaramakrishnan Narayan and Parampalli Udaya},
title={SECURE COMMUNICATION IN MOBILE AD HOC NETWORK USING EFFICIENT CERTIFICATELESS ENCRYPTION},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={306-311},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001921703060311},
isbn={978-989-8111-59-3},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - SECURE COMMUNICATION IN MOBILE AD HOC NETWORK USING EFFICIENT CERTIFICATELESS ENCRYPTION
SN - 978-989-8111-59-3
AU - Hyun-Jeen Lee P.
AU - Narayan S.
AU - Udaya P.
PY - 2008
SP - 306
EP - 311
DO - 10.5220/0001921703060311