Abstract

The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

Highlights

  • Wireless ad hoc network (WANET) is a decentralized type of wireless network

  • The user authentication scheme based on self-certified public key (SCPK) and elliptic curves cryptography (ECC) is a feasible alternative for resource-constrained wireless networks, such as WANET, mobile ad hoc networks and wireless sensor networks

  • In [10], a distributed user authentication scheme based on SCPK was presented

Read more

Summary

Introduction

Wireless ad hoc network (WANET) is a decentralized type of wireless network. It has widely practical applications, such as tactical communication, emergency communication, temporary. The user authentication scheme based on SCPK and ECC is a feasible alternative for resource-constrained wireless networks, such as WANET, mobile ad hoc networks and wireless sensor networks. In [10], a distributed user authentication scheme based on SCPK was presented In this scheme, each user gets his/her public/private key from CA through a secure communication channel. Our proposed user authentication scheme differs from other existing user authentication schemes in [10,11,12] are: (1) A secure communication channel for distributing user’s public/private key does not need; (2) A modified challenge-response mechanism is adopted to resist the replay attack; (3) The authentication mechanism between user and CA in the user registration phase is used to resist the user masquerade attack.

System Model
The Proposed User Authentication Scheme
The Setup Phase
The User Registration Phase
The User Authentication Phase
Security Analysis
Security Analysis in User Registration Phase
Security Analysis in User Authentication Phase
Performance Analysis
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.