Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks

被引:10
|
作者
Kwon, Hyunsoo [1 ]
Kim, Daeyeong [1 ]
Hahn, Changhee [1 ]
Hur, Junbeom [1 ]
机构
[1] Korea Univ, Dept Comp Sci & Engn, 145 Anam Ro, Seoul 136701, South Korea
基金
新加坡国家研究基金会;
关键词
D2D communication; Mobile multi-hop networks; CP-ABE; Authentication;
D O I
10.1007/s11042-015-3187-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the dramatic increase of the number of mobile devices such as smartphones and tablet PCs, mobile traffic has increased enormously. Especially, the multimedia data accounts for bulk of the traffic transmitted in mobile networks. To accommodate this growth, device-to-device connection (D2D), which provides infra-connection off-loading, is receiving significant attention. However, we have observed that the majority of the current D2D protocols including Bluetooth and Wi-Fi Direct are vulnerable to man-in-the-middle (MITM) and replay attacks in mobile multi-hop networks. To resolve this problem, in this paper, we propose a novel D2D authentication protocol with a secure initial key establishment using ciphertext-policy attribute-based encryption (CP-ABE). By leveraging CP-ABE, the proposed scheme allows the communicating parties to mutually authenticate and derive the link key in an expressive and secure manner in a multi-hop network environment. We also propose several variations of the proposed scheme for different scenarios in a multi-hop networks without network infrastructure. We prove that the proposed scheme is secure against MITM and replay attack in D2D mobile multi-hop networks. Experimental results indicate that the proposed scheme incurs reasonable computation cost in the real world.
引用
收藏
页码:19507 / 19521
页数:15
相关论文
共 50 条
  • [31] Securely outsourcing the ciphertext-policy attribute-based encryption
    Kim Thuat Nguyen
    Oualha, Nouha
    Laurent, Maryline
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01): : 169 - 183
  • [32] Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme
    Asim, Muhammad
    Ibraimi, Luan
    Petkovic, Milan
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 244 - +
  • [33] Ciphertext Policy Attribute-Based Proxy Re-encryption
    Luo, Song
    Hu, Jianbin
    Chen, Zhong
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 401 - +
  • [34] An Improved Ciphertext-Policy Attribute-Based Encryption Scheme
    Zheng, Hua
    Zhang, Xi
    Yang, Qi
    [J]. SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 400 - 411
  • [35] Removing escrow from ciphertext policy attribute-based encryption
    Hur, Junbeom
    Koo, Dongyoung
    Hwang, Seong Oun
    Kang, Kyungtae
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2013, 65 (09) : 1310 - 1317
  • [36] Securely outsourcing the ciphertext-policy attribute-based encryption
    Kim Thuat Nguyen
    Nouha Oualha
    Maryline Laurent
    [J]. World Wide Web, 2018, 21 : 169 - 183
  • [37] Toward Secure Data Storage in Web 3.0: Ciphertext-Policy Attribute-Based Encryption
    Gong, Bei
    Guo, Chong
    Liu, Yi-Jing
    Wang, Qian
    [J]. IEEE NETWORK, 2023, 37 (06): : 42 - 49
  • [38] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    Xu Peng
    Tang Yong
    Jiang Wenbin
    Jin Hai
    Zou Deqing
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 655 - 660
  • [39] Ciphertext-policy attribute-based encryption with short keys
    [J]. Jiang, Wenbin, 1600, Chinese Institute of Electronics (23):
  • [40] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    XU Peng
    TANG Yong
    JIANG Wenbin
    JIN Hai
    ZOU Deqing
    [J]. Chinese Journal of Electronics, 2014, 23 (04) : 655 - 660