Skip to main content

Non-Interactive Authentication and Confidential Information Exchange for Mobile Environments

  • Conference paper
  • First Online:
International Joint Conference (CISIS 2015)

Abstract

The growing number of devices that can connect to the Internet has given rise to a new concept that is having much impact nowadays, the Internet of Things. Thus, it is necessary to devise innovative security schemes to become accustomed to this new dimension of the Internet, where everything is connected to everything. This paper describes a new scheme for authentication and exchange of confidential information in the non-secure environment of the Internet of Things. The proposal is based on the concept of non-interactive zero-knowledge proofs, allowing that in a single communication, relevant data may be inferred for verifying the legitimacy of network nodes, and for sharing a session key. The proposal has been developed for the platforms built on the Android Open Source Project so it can be used both in smartphones and wearable devices. This paper provides a full description of the design, implementation and analysis of the proposed scheme. It also includes a comparison to similar schemes, which has revealed promising results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Agren, M.: On some symmetric lightweight cryptographic designs. Diss. Lund University (2012)

    Google Scholar 

  2. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  MATH  Google Scholar 

  3. Bansod, G., Raval, N., Pisharoty, N.: Implementation of a new lightweight encryption design for embedded security. IEEE Trans. Inf. Forensics Secur. 10(1) (2015)

    Google Scholar 

  4. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G., Keccak sponge function family main document. Updated submission to NIST, Round 2, version 2.1 (2010)

    Google Scholar 

  5. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak SHA-3 submission. http://keccak.noekeon.org/Keccak-submission-3.pdf

  6. Brusilovsky, A., Faynberg, I., Zeltsan, Z., Patel, S.: Password-Authenticated Key (PAK) Diffie-Hellman Exchange. RFC 5683 (2010)

    Google Scholar 

  7. Caballero-Gil, P., Caballero-Gil, C., Molina-Gil, J., Hernández-Goya, C.: Self-organized authentication architecture for mobile Ad-hoc networks. In: IEEE International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops WiOPT, pp. 217–224 (2008)

    Google Scholar 

  8. Caballero-Gil, C., Caballero-Gil, P., Molina-Gil, J.: Knowledge management using clusters in VANETs-description, simulation and analysis. In: International Conference on Knowledge Management and Information Sharing, pp. 170–175 (2010)

    Google Scholar 

  9. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22, 644–654 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  10. Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., Uhsadel, L.: A survey of lightweight-cryptography implementations. IEEE Des. Test Comput. 4(6), 522–533 (2007)

    Article  Google Scholar 

  11. Ekdahl, P., Johansson, T.: A new version of the stream cipher SNOW. Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 2595, pp. 37–46 (2003)

    Google Scholar 

  12. ETSI/SAGE: Specification of the 3GPP confidentiality and integrity algorithms UEA2 and UIA2. Document 2, SNOW 3G Specification, version 1.1 (2005)

    Google Scholar 

  13. Feige, U., Fiat, A., Shamir, A.: Zero-knowledge proofs of identity. J. Cryptol. 1(2), 77–94 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  14. Garey, M.R., Johnson, D.S.: Computers and intractability: a guide the theory of NP-completeness. Freeman and Co., (1979)

    Google Scholar 

  15. Gartner, Analysts to explore the disruptive impact of IoT on business. In: Gartner Symposium/ITxpo, Spain (2014)

    Google Scholar 

  16. Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. J. ACM 38(3), 690–728 (1991)

    Article  MathSciNet  Google Scholar 

  17. Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186–208 (1989)

    Article  MATH  MathSciNet  Google Scholar 

  18. Groth, J.: Short non-interactive zero-knowledge proofs. In: Advances in Cryptology—ASIACRYPT, pp. 341–358 (2010)

    Google Scholar 

  19. Grzonkowski, S., Zaremba, W., Zaremba, M., McDaniel, B.: Extending web applications with a lightweight zero knowledge proof authentication. In: ACM International Conference on Soft Computing as Transdisciplinary Science and Technology, pp. 65–70 (2008)

    Google Scholar 

  20. Kantar, Kantar Worldpanel ComTech. http://www.kantarworldpanel.com/global/smartphone-os-market-share/ (2015)

  21. Martin-Fernandez, F.: Source code of the proposed authenticated scheme. https://github.com/pacomf/ASD (2014)

  22. Schweitzer, P.: Problems of unknown complexity. Graph isomorphism and Ramsey theoretic numbers. Diss. University of Saarlandes (2009)

    Google Scholar 

  23. Toorani, M., Beheshti, A.: LPKI—a lightweight public key infrastructure for the mobile environments. In: IEEE Singapore International Conference on Communication Systems, pp. 162–165 (2008)

    Google Scholar 

Download references

Acknowledgments

Research supported under TIN2011-25452, IPT-2012-0585-370000, BES-2012-051817, and RTC-2014-1648-8.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pino Caballero-Gil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Martín-Fernández, F., Caballero-Gil, P., Caballero-Gil, C. (2015). Non-Interactive Authentication and Confidential Information Exchange for Mobile Environments. In: Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E. (eds) International Joint Conference. CISIS 2015. Advances in Intelligent Systems and Computing, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-319-19713-5_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19713-5_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19712-8

  • Online ISBN: 978-3-319-19713-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics