A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks

被引:12
|
作者
Chen, Huifang [1 ,2 ]
Ge, Linlin [1 ]
Xie, Lei [1 ,2 ]
机构
[1] Zhejiang Univ, Dept Informat Sci & Elect Engn, Hangzhou 310027, Zhejiang, Peoples R China
[2] Zhejiang Prov Key Lab Informat Network Technol, Hangzhou 310027, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
wireless ad hoc network (WANET); self-certified public key (SCPK); elliptic curves cryptography (ECC); user authentication; session key agreement;
D O I
10.3390/s150717057
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.
引用
收藏
页码:17057 / 17075
页数:19
相关论文
共 50 条
  • [31] Secure mutual authentication for ad hoc wireless networks
    Kim Byung-Gi
    Sang-Sun Hong
    The Journal of Supercomputing, 2005, 33 (1-2) : 123 - 132
  • [32] Secure Mutual Authentication for Ad hoc Wireless Networks
    Byung-Gi Kim
    Sang-Sun Hong
    The Journal of Supercomputing, 2005, 33 : 123 - 132
  • [33] Secure mutual authentication for ad hoc wireless networks
    Kim, BG
    Hong, SS
    JOURNAL OF SUPERCOMPUTING, 2005, 33 (1-2): : 123 - 132
  • [34] A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card
    Li, Chun-Ta
    IET INFORMATION SECURITY, 2013, 7 (01) : 3 - 10
  • [35] Evaluation of Authentication Based Elliptic Curve Cryptography in Wireless Sensor Networks in IoT Context
    Bettoumi, Balkis
    Bouallegue, Ridha
    2018 26TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2018, : 258 - 262
  • [36] Threshold Signature Cryptography Scheme in Wireless Ad-Hoc Computing
    Vijay, Sandip
    Sharma, Subhash C.
    CONTEMPORARY COMPUTING, PROCEEDINGS, 2009, 40 : 327 - 335
  • [37] A key management scheme for mobile ad hoc networks based on threshold cryptography for providing fast authentication and low signaling load
    Nguyen, HN
    Morino, H
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 905 - 915
  • [38] Lightweight Authentication-based Scheme for AODV in Ad-hoc Networks
    Nissar, Nabil
    Naja, Najib
    Jamali, Abdellah
    2017 INTERNATIONAL CONFERENCE ON WIRELESS TECHNOLOGIES, EMBEDDED AND INTELLIGENT SYSTEMS (WITS), 2017,
  • [39] Blockchain Based Vehicle Authentication Scheme for Vehicular Ad-hoc Networks
    Stephen, Steffie Maria
    Jaekel, Arunita
    2021 IEEE INTELLIGENT VEHICLES SYMPOSIUM WORKSHOPS (IV WORKSHOPS), 2021, : 1 - 6
  • [40] On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
    He, Jun
    Yang, Zheng
    Zhang, Jianxun
    Liu, Wanping
    Liu, Chao
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (01):