An ECC-Based Two-Party Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks
نویسندگان
چکیده
Mobile ad hoc networks (MANETs) are known to be unprotected due to the nature of message propagation and the openness of public channel. Another important characteristic of MANETs is their being basically energy constrained. While it is known that symmetric key cryptography provides a high degree of secrecy and efficiency, but has a number of significant difficulties for the MANET domain in key distribution, key management, scalability and provision of non-repudiation. Public key cryptography (PKC) on other hand provides solutions to the problems inherent in symmetric key cryptography with authenticated key agreement protocols. However the constraints of MANETs such as mobility of nodes, lack of network services and servers make such a proposition difficult. In this paper, we propose a PKC based new energy efficient twoparty mutual authenticated key agreement protocol suitable for MANETs. Its security is based on the elliptic curve discrete logarithm assumption. We provide proof here for the security of the proposed protocol and show its relative better performance when compared with other relevant protocols.
منابع مشابه
Security in Wireless Ad Hoc Networks
An ad hoc network is a collection of wireless nodes that dynamically form a temporary network and operates without the use of existing network infrastructure. In the near future, many personal electronic devices will be able to communicate with each other over a short-range wireless channel. We investigate the principal security issues for such an environment. The traditional way of protecting ...
متن کاملComments on the Lu-Su Authenticated Key Agreement Scheme in Ad hoc Networks
Lu and Su [Comm. Of the CCISA 12(1) (2006) pp.93-104] proposed an authenticated key agreement scheme in Ad hoc Networks. Their scheme based on Shamir’s ID-based cryptosystem and Okamoto’s key distribution system attempts concurrently to achieve two goals: (1) any mobile node A can authenticate the other one B, who is communicating with A, is illegitimate node or not, and (2) A and B can obtain ...
متن کاملAuthenticated Group Key Agreement Protocols for Ad hoc Wireless Networks
The lack of fixed infrastructure, both physical and organizational, and the highly dynamic nature of ad hoc networks, presents a major challenge in providing secure, authenticated communication for these networks. Traditional key management solutions reported in the literature lack both the flexibility and robustness required to cope with the dynamic nature of ad hoc networks. In this paper, we...
متن کاملImproving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR
Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...
متن کاملA three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one’s contribution over a public network without any central authority. They also provide efficient ways to change the key when the participants change. While some of the proposed GKA protocols are too resource consuming for the constraint devices often present in ad hoc networks, others lack a formal secu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JCP
دوره 6 شماره
صفحات -
تاریخ انتشار 2011