Skip to main content

An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET

  • Conference paper
  • First Online:
Book cover Security in Computing and Communications (SSCC 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 536))

Included in the following conference series:

Abstract

Mobile Ad hoc Network (MANET) is a matter of great concern and an emerging research field of ubiquitous computing. Nowadays, security issues regarding MANETs are gaining remarkable research interest. MANET is more vulnerable to the security attacks by resource constraints. An ID based cryptography allows an user to generate their public keys without exchanging any certificates. In above scheme, public/private key can be construct without exchanging any certificate. The idea of bilinear pairings make the system efficient and easy to providing basic security. In order to provide secure communication in MANET, many researchers used different schemes to provide authentication. However, existing techniques have drawbacks such as forgery on adaptive chosen plain text message and back secrecy in traditional authentication schemes. In this paper, we work on an ID based signature scheme for achieving reliability and secure authentication in MANET. We show that proposed id based signature scheme is secure against forgery attack in the random oracle model under the Inverse-Computational Diffie-Hellman Problem (Inv-CDHP) assumption. Proposed scheme is more efficient in term of computation than other traditional schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hu, Y.-C., Perrig, A.: A survey of secure wireless ad hoc routing. In: Proceedings of IEEE Security and Privacy, pp. 28–39. IEEE Press (2004)

    Google Scholar 

  2. Burmeste, M., de Medeiros, B.: On the security of route discovery in MANETs. In: Proceedings of IEEE Transactions on mobile computing, vol. 8, pp. 1180–1187. IEEE Press (2009)

    Google Scholar 

  3. Argyroudis, P.G., Mahony, D.O.: Secure routing for mobile ad hoc networks. In: Proceedings of IEEE Communications Surveys and Tutorials, Third Quarter, vol. 7, pp. 2–21. IEEE Press (2005)

    Google Scholar 

  4. Tian, B., Han, S., Hu, J., Dillon, T.: A mutual-healing key distribution scheme in wireless sensor networks. J. Netw. Comput. Appl. 34, 80–88 (2011). Elsevier

    Article  Google Scholar 

  5. Tian, B., Han, S., Parvin, S., Hu, J., Das, S.: Self-healing key distribution schemes for wireless networks: a Survey. Comput. J. 54(4), 549–569 (2011). Oxford

    Article  Google Scholar 

  6. Konate, K., Gaye, A.: attacks analysis in mobile ad hoc networks: modeling and simulation. In: Proceedings of IEEE International Conference on Intelligent Systems, Modeling and Simulation, pp. 367–372. IEEE Press (2011)

    Google Scholar 

  7. Zhang, Y., Lee, W.: Security in mobile ad-hoc networks. In: Mohapatra, P., Krishnamurthy, S.V. (eds.) Book Ad hoc Networks Technologies and Protocols, pp. 249–268. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. Westhoff, D., Lamparter, B., Paar, C., Weimerskirch, A.: On digital signature in ad hoc network. Trans. Emerg. Telecommun. Technol. 16, 411–425 (2005)

    Article  Google Scholar 

  9. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  10. Zhang, F., Safavi-Naini, R., Susilo, W.: An efficient signature scheme from bilinear pairings and its applications. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 277–290. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Hu, Y.C., Perrig, A., Johnson, D.B.: Aridane: a secure on-demand routing protocol for ad hoc networks. In: Proceedings of International Conference on Mobile Computing and Networking (MobiCom 2002), pp. 12–23. ACM Press (2002)

    Google Scholar 

  12. Sanzgiri, K. et al. : A secure routing protocol for ad hoc networks. In: Proceedings of IEEE International Conference (INCP-02), pp. 78–87. IEEE Press (2002)

    Google Scholar 

  13. Zapata, M.G., Asokan, N.: Securing ad hoc routing protocols. In: Proceedings ACM Workshop on Wireless Security (WiSe), pp. 1–10. ACM Press (2002)

    Google Scholar 

  14. Wang, H., Zhang, Y.: Identity-based strong key-insulated ring signature scheme in the standard model. In: Seventh International Conference Mobile Ad-hoc Sensor Networks, pp. 451–455 (2011)

    Google Scholar 

  15. Mishra, S., Sahu, R.A., Padhye, S., Yadav, R.S.: An ID-based signature scheme from bilinear pairing based on k-plus problem. In: Proceedings of 3rd International Conference on Electronics Computer Technology (ICECT- 2011), Kanyakumari, India. IEEE, pp. 104–107 (2011)

    Google Scholar 

  16. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

Download references

Acknowledgements

This research work is partially funded by the Technical Quality Improvement Programme Phase II (TEQIP-II).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vimal Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Kumar, V., Kumar, R. (2015). An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-Martínez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22915-7_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22914-0

  • Online ISBN: 978-3-319-22915-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics