Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks

被引:0
|
作者
Hyunsoo Kwon
Daeyeong Kim
Changhee Hahn
Junbeom Hur
机构
[1] Korea University,Department of Computer Science and Engineering
来源
关键词
D2D communication; Mobile multi-hop networks; CP-ABE; Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
With the dramatic increase of the number of mobile devices such as smartphones and tablet PCs, mobile traffic has increased enormously. Especially, the multimedia data accounts for bulk of the traffic transmitted in mobile networks. To accommodate this growth, device-to-device connection (D2D), which provides infra-connection off-loading, is receiving significant attention. However, we have observed that the majority of the current D2D protocols including Bluetooth and Wi-Fi Direct are vulnerable to man-in-the-middle (MITM) and replay attacks in mobile multi-hop networks. To resolve this problem, in this paper, we propose a novel D2D authentication protocol with a secure initial key establishment using ciphertext-policy attribute-based encryption (CP-ABE). By leveraging CP-ABE, the proposed scheme allows the communicating parties to mutually authenticate and derive the link key in an expressive and secure manner in a multi-hop network environment. We also propose several variations of the proposed scheme for different scenarios in a multi-hop networks without network infrastructure. We prove that the proposed scheme is secure against MITM and replay attack in D2D mobile multi-hop networks. Experimental results indicate that the proposed scheme incurs reasonable computation cost in the real world.
引用
收藏
页码:19507 / 19521
页数:14
相关论文
共 50 条
  • [41] Toward Secure Data Storage in Web 3.0: Ciphertext-Policy Attribute-Based Encryption
    Gong, Bei
    Guo, Chong
    Liu, Yi-Jing
    Wang, Qian
    IEEE NETWORK, 2023, 37 (06): : 42 - 49
  • [42] An Implementation of Secure Data Exchange System with Multi-hop Routing in Wireless Delay Tolerant Network Using Attribute-Based Encryption
    Sudarsono, Amang
    Nakanishi, Tom
    PROCEEDINGS OF 2015 THIRD INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2015, : 470 - 476
  • [43] Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption
    Rao, Y. Sreenivasa
    Dutta, Ratna
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4157 - 4176
  • [44] Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    SENSORS, 2019, 19 (07)
  • [45] Lattice ciphertext policy attribute-based encryption in the standard model
    Wang, Yongtao
    International Journal of Network Security, 2014, 16 (06) : 444 - 451
  • [46] Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption
    Feng, Xinyu
    Li, Cong
    Li, Dan
    Fang, Yuejian
    Shen, Qingni
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 192 - 204
  • [47] A Secure Ciphertext Self-Destruction Scheme with Attribute-Based Encryption
    Yang, Tonghao
    Li, Junquan
    Yu, Bin
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [48] Privacy Enhanced DigiLocker using Ciphertext-Policy Attribute-Based Encryption
    Bakshi, Puneet
    Nandi, Sukumar
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 541 - 546
  • [49] Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Wu, Yulin
    Yiu, S. M.
    2018 IEEE INT CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, UBIQUITOUS COMPUTING & COMMUNICATIONS, BIG DATA & CLOUD COMPUTING, SOCIAL COMPUTING & NETWORKING, SUSTAINABLE COMPUTING & COMMUNICATIONS, 2018, : 1003 - 1008
  • [50] A Fully Secure Ciphertext-Policy Attribute-Based Encryption With a Tree-Based Access Structure
    Rifki, Sadikin
    Park, YoungHo
    Moon, SangJae
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2015, 31 (01) : 247 - 265