Abstract
Entity Authentication and Key Agreement (AKA), is a critical cryptographic problem in wireless communication, where a mutual entity authentication plays a vital role in the establishment of the secure and authentic connection. The paper proposes an efficient authenticated key agreement scheme and increases the speed of authentication process more securely. The signaling overhead is minimized by creating the validity token at home agent of mobile equipment, which indicates if the certificate of the foreign agent is valid or invalid. An efficient way for the implementation of an enhanced version of the protocol is proposed. NTRU algorithm is applied to encrypt and decrypt the messages. NTRU algorithm is one of the efficient asymmetric key lattice-based cryptographic algorithm. NTRU has been proved to be the fastest and secure encryption algorithm. AES is used for symmetric key encryption. The result demonstrates that the proposed method is efficient.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Albasheer, M.O., Bashier, E.B.M.: Enhanced model for PKI certificate validation in the mobile banking. In: 2013 International Conference on Computing, Electrical and Electronic Engineering (ICCEEE), pp. 470–476, August 2013
Bai, T., Davis, S., Li, J., Jiang, H.: Analysis and acceleration of NTRU lattice-based cryptographic system. In: 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), pp. 1–6, June 2014
Bhandari, R., Choudhary, A.: 3GPP AKA protocol: simplified authentication process. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(12), 655–658 (2014)
Forouzan, B.A.: Cryptography and Network Security, 1st edn. McGraw-Hill Inc., New York (2008)
Gururaj, H.L., Sunitha, R., Ramesh, B.: Enhanced authentication technique for next generation 3GPP networks. In: 2014 International Conference on Contemporary Computing and Informatics (IC3I), pp. 1361–1365, November 2014
Hoffstein, J., Pipher, J., Schanck, J.M., Silverman, J.H., Whyte, W., Zhang, Z.: Choosing parameters for NTRUEncrypt. In: Handschuh, H. (ed.) CT-RSA 2017. LNCS, vol. 10159, pp. 3–18. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-52153-4_1
Jiang, S., Zhu, X., Wang, L.: An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Trans. Intell. Transp. Syst. 17(8), 2193–2204 (2016)
Khan, W., Ullah, H.: Authentication and secure communication in GSM, GPRS, and UMTS using asymmetric cryptography. Int. J. Comput. Sci. Issues (IJCSI) 7(3), 10 (2010)
Micciancio, D., Regev, O.: Lattice-based cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 147–191. Springer, Berlin (2009). https://doi.org/10.1007/978-3-540-88702-7_5
El Moustaine, E., Laurent, M.: A lattice based authentication for low-cost RFID. In: 2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA), pp. 68–73, November 2012
Munoz, J.L., Forne, J., Castro, J.C.: Evaluation of certificate revocation policies: OCSP vs. Overissued-CRL. In: Proceedings of the 13th International Workshop on Database and Expert Systems Applications, pp. 511–515, September 2002
Nguyen, H.B.: An overview of the NTRU cryptographic system. Ph.D. thesis, San Diego State University (2014)
Park, S.W., Lee, I.Y.: Anonymous authentication scheme based on NTRU for the protection of payment information in NFC mobile environment. J. Inf. Process. Syst. 9(3), 461–476 (2013)
Shen, X., Du, Z., Chen, R.: Research on NTRU algorithm for mobile Java security. In: 2009 International Conference on Scalable Computing and Communications; Eighth International Conference on Embedded Computing, pp. 366–369, September 2009
Stallings, W.: Cryptography and Network Security: Principles and Practice, 6th edn. Prentice Hall Press, Upper Saddle River (2013)
Zemao, C., Junge, Z., Biyi, H.: Optimizing PKI for 3GPP authentication and key agreement. In: 2012 Fourth International Conference on Multimedia Information Networking and Security (MINES), pp. 79–82. IEEE (2012)
Zhao, X., Wenyan, Z., Shanshan, C.: New certificate status verification scheme based on OCSP for wireless environment. In: 2009 International Forum on Computer Science-Technology and Applications, vol. 2, pp. 195–198, December 2009
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Prakasha, K., Gowda, P., Acharya, V., Muniyal, B., Khandelwal, M. (2018). Enhanced Authentication and Key Agreement Mechanism Using PKI. In: Chen, Q., Wu, J., Zhang, S., Yuan, C., Batten, L., Li, G. (eds) Applications and Techniques in Information Security. ATIS 2018. Communications in Computer and Information Science, vol 950. Springer, Singapore. https://doi.org/10.1007/978-981-13-2907-4_4
Download citation
DOI: https://doi.org/10.1007/978-981-13-2907-4_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2906-7
Online ISBN: 978-981-13-2907-4
eBook Packages: Computer ScienceComputer Science (R0)