Abstract
With the dramatic increase of the number of mobile devices such as smartphones and tablet PCs, mobile traffic has increased enormously. Especially, the multimedia data accounts for bulk of the traffic transmitted in mobile networks. To accommodate this growth, device-to-device connection (D2D), which provides infra-connection off-loading, is receiving significant attention. However, we have observed that the majority of the current D2D protocols including Bluetooth and Wi-Fi Direct are vulnerable to man-in-the-middle (MITM) and replay attacks in mobile multi-hop networks. To resolve this problem, in this paper, we propose a novel D2D authentication protocol with a secure initial key establishment using ciphertext-policy attribute-based encryption (CP-ABE). By leveraging CP-ABE, the proposed scheme allows the communicating parties to mutually authenticate and derive the link key in an expressive and secure manner in a multi-hop network environment. We also propose several variations of the proposed scheme for different scenarios in a multi-hop networks without network infrastructure. We prove that the proposed scheme is secure against MITM and replay attack in D2D mobile multi-hop networks. Experimental results indicate that the proposed scheme incurs reasonable computation cost in the real world.







Similar content being viewed by others
References
3GPP (2012) Feasibility study on proximity-based services. Technical report, 3GPP
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. IEEE Symposium on Security and Privacy(SP’07):321–334
Boneh D, Matthew F (2001) Identity-based encryption from the Weil Pairing. CRYPTO, LNCS:213–229
Bruno R, Conti M, Gregori E (2005) Mesh networks: commodity multihop ad hoc networks. Commun Mag, IEEE 43(3):123–131
Camps-Mur D, Garcia-Saavedra A, Serrano P (2013) Device-to-device communications with Wi-Fi direct: overview and experimentation. Wirel Commun, IEEE 20(3):96–104
CISCO (2014) Cosco visual netowking index: global mobile data traffic forecast update, 2013–2018. White paper
Cocks C (2001) An identity based encryption scheme based on quadratic residues. Cryptography and Coding 2001, LNCS:360–363
Corson S, Macker J (1999) Mobile Ad hoc Networking(MANET): routing protocol performance issues and evaluation considerations. IETF RFC 2501
Estrin D, Girod L, Pottie G, Srivastava M (2001) Instrumenting the world with wireless sensor networks. International Conference on Acoustics, Speech and Signal Processing (ICASSP 2001), Salt Lake City, Utah 4:2033–2036
Huang J, Huang C (2011) Secure mutual authentication protocols for mobile multi-hop relay WIMAX networks against rogue base/relay stations. 2011 I.E. Int Conf Commun:1–5
IEEE 802.15 WPAN Task Group8 peer aware communications, http://www.ieee802.org/15/pub/TG8.html
IEEE Computer Society LAN MAN Standards Committee (1997) Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications. Technical report, IEEE Computer Society LAN MAN Standards Committee
Java Pairing-Based Cryptography Library(JPBC), http://gas.dia.unisa.it/projects/jpbc
Khalil I, Bataineh S, Qubajah L, Khreishah A (2013) Distributed secure routing protocol for Mobile Ad-Hoc networks. Comput Sci Inform Technol 2013:106–110
Kugler D (2003) Man in the middle attacks on bluetooth. Financial cryptography. LNCS:149–161
Kwon H, Hahn C, Kim D, Kang K, Hur J (2014) Secure device-to-device authentication in mobile multi-hop networks. Wireless Algorithms. Syst Appl:267–278
Kwon H, Shin J, Lee B, Choi J, Nam S, Lim S (2003) Technical trends on mobile Ad Hoc networks. Electron Telecommun Trends 18:11–24
Lee C (2006) Bluetooth security protocol analysis and improvements. M.Sc. thesis at San Jose State University, http://www.cs.sjsu.edu/faculty/stamp/students/cs298ReportSteven.pdf
Lee Y, Lee H, Lee G, Kim H, Jeong C (2009) Design of hybrid authentication scheme and key distribution for mobile multi-hop relay in IEEE 802.16j. Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship 12
Mahmoud ME, Shen XS (2009) Anonymous and authenticated routing in Multi- Hop cellular networks. IEEE Int Conf Commun:1–6
Open source project ciphertext-policy attribute based encryption(CP-ABE), https://github.com/junwei-wang/cpabe
Perkins CE (2008) Ad Hoc networking. Addison Wesley Professional, Indianapolis
Sahai A (1985) Identity-based crptosystems and signature schemes. Advances in Cryptology-CRYPTO, LNCS:47–53
Sahai A, Waters B (2005) Fuzzy identity-based encryption. Advances in cryptology-EUROCRYPT, LNCS:457–473
Wi-Fi Alliance (2005) Quality of Service (QoS) Task Group, Wi-Fi Multi-media(including WMM PowerSave) Specification v1.1
Wi-Fi Alliance (2007) Wi-Fi protected setup specification. Wi-Fi Alliance Document
Xingliang Z, Shilian X (2012) A new authentication scheme for wireless Ad Hoc Network. 2012 Information management. Innov Manag Ind Eng 2:312–315
Acknowledgments
This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIP) (No. 2013R1A2A2A01005559). This work was also supported by Institute for Information & communications Technology Promotion(IITP) grant funded by the Korea government(MSIP) (No. B0190-15-2028 and No. R0190-15-2011)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kwon, H., Kim, D., Hahn, C. et al. Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks. Multimed Tools Appl 76, 19507–19521 (2017). https://doi.org/10.1007/s11042-015-3187-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-3187-z