A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks

被引:12
|
作者
Chen, Huifang [1 ,2 ]
Ge, Linlin [1 ]
Xie, Lei [1 ,2 ]
机构
[1] Zhejiang Univ, Dept Informat Sci & Elect Engn, Hangzhou 310027, Zhejiang, Peoples R China
[2] Zhejiang Prov Key Lab Informat Network Technol, Hangzhou 310027, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
wireless ad hoc network (WANET); self-certified public key (SCPK); elliptic curves cryptography (ECC); user authentication; session key agreement;
D O I
10.3390/s150717057
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.
引用
收藏
页码:17057 / 17075
页数:19
相关论文
共 50 条
  • [21] An Authentication Technique in Mobile Ad hoc Network using Elliptic Curve Cryptography
    Kumar, Rohit
    Shiv, Yashendra
    Kumar, Vimal
    Wairiya, Manoj
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 209 - 213
  • [22] Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks
    Park, Seong-Soo
    Lee, Jong-Hyouk
    Chung, Tai-Myoung
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2009, PT II, 2009, 5593 : 345 - +
  • [23] An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography
    Chaudhry, Shehzad Ashraf
    Naqvi, Husnain
    Mahmood, Khalid
    Ahmad, Hafiz Farooq
    Khan, Muhammad Khurram
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5355 - 5373
  • [24] Distributed authentication scheme for cluster-based ad hoc networks
    Zhou, Nan-Run
    Wan, Hui
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (09): : 2247 - 2251
  • [25] A lightweight authentication scheme for vehicular ad hoc networks based on MSR
    Yang, Xu
    Yi, Xun
    Khalil, Ibrahim
    Zeng, Yali
    Huang, Xinyi
    Nepal, Surya
    Yang, Xuechao
    Cui, Hui
    VEHICULAR COMMUNICATIONS, 2019, 15 : 16 - 27
  • [26] Cluster based security scheme in wireless Ad Hoc networks
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    Jisuanji Yanjiu yu Fazhan, 2006, 2 (238-243):
  • [27] A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
    Chang, Chin-Chen
    Le, Hai-Duong
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) : 357 - 366
  • [28] DASSR: A Distributed Authentication Scheme for Secure Routing in Wireless Ad-hoc Networks
    Phung, Phu H.
    Quang Tran Minh
    FUTURE DATA AND SECURITY ENGINEERING, FDSE 2016, 2016, 10018 : 219 - 236
  • [29] Elliptic curve cryptography based wireless authentication protocol
    Yongliang, Liu
    Gao, Wen
    Yao, Hongxun
    Yu, Xinghua
    International Journal of Network Security, 2007, 5 (03) : 327 - 337
  • [30] Message authentication scheme for mobile ad hoc networks
    Sato, F
    Takahira, H
    Mizuno, T
    11TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL I, PROCEEDINGS, 2005, : 50 - 56