Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks

被引:0
|
作者
Hyunsoo Kwon
Daeyeong Kim
Changhee Hahn
Junbeom Hur
机构
[1] Korea University,Department of Computer Science and Engineering
来源
关键词
D2D communication; Mobile multi-hop networks; CP-ABE; Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
With the dramatic increase of the number of mobile devices such as smartphones and tablet PCs, mobile traffic has increased enormously. Especially, the multimedia data accounts for bulk of the traffic transmitted in mobile networks. To accommodate this growth, device-to-device connection (D2D), which provides infra-connection off-loading, is receiving significant attention. However, we have observed that the majority of the current D2D protocols including Bluetooth and Wi-Fi Direct are vulnerable to man-in-the-middle (MITM) and replay attacks in mobile multi-hop networks. To resolve this problem, in this paper, we propose a novel D2D authentication protocol with a secure initial key establishment using ciphertext-policy attribute-based encryption (CP-ABE). By leveraging CP-ABE, the proposed scheme allows the communicating parties to mutually authenticate and derive the link key in an expressive and secure manner in a multi-hop network environment. We also propose several variations of the proposed scheme for different scenarios in a multi-hop networks without network infrastructure. We prove that the proposed scheme is secure against MITM and replay attack in D2D mobile multi-hop networks. Experimental results indicate that the proposed scheme incurs reasonable computation cost in the real world.
引用
收藏
页码:19507 / 19521
页数:14
相关论文
共 50 条
  • [21] Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
    Waters, Brent
    PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 53 - 70
  • [22] A Revocable and Key Secure Ciphertext-Policy Attribute-based Encryption Scheme Based on Blockchain
    Zhou, Xingyu
    Li, Wenmin
    Zhang, Huimin
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 7 - 10
  • [23] Cloud-based Secure Healthcare Framework by using Enhanced Ciphertext Policy Attribute-Based Encryption Scheme
    Satar, Siti Dhalila Mohd
    Mohamed, Mohamad Afendee
    Hussin, Masnida
    Hanapi, Zurina Mohd
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (06) : 393 - 399
  • [24] Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles
    Liu, Zhen
    Cao, Zhenfu
    Huang, Qiong
    Wong, Duncan S.
    Yuen, Tsz Hon
    COMPUTER SECURITY - ESORICS 2011, 2011, 6879 : 278 - +
  • [25] Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    Zhou, Yunya
    COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 91 - 108
  • [26] Secure Device-to-Device Authentication in Mobile Multi-hop Networks
    Kwon, Hyunsoo
    Hahn, Changhee
    Kim, Daeyoung
    Kang, Kyungtae
    Hur, Junbeom
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2014, 2014, 8491 : 267 - 278
  • [27] Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing
    Zhao, Zhiyuan
    Wang, Jianhua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (06): : 3254 - 3272
  • [28] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
    Emura, Keita
    Miyaji, Atsuko
    Nomura, Akito
    Omote, Kazumasa
    Soshi, Masakazu
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 13 - +
  • [29] Server Aided Ciphertext-Policy Attribute-Based Encryption
    Wang, Hao
    Yang, Bo
    Wang, Yilei
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 440 - 444
  • [30] Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption
    Kim, Intae
    Susilo, Willy
    Baek, Joonsang
    Kim, Jongkil
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1856 - 1870