Skip to main content

Advertisement

Log in

PF-ID-2PAKA: Pairing Free Identity-Based Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

To ensure secure communication between any two entities, authenticated key agreement protocol is the primary step and current research has a lot of contribution in this direction. In this paper, we propose a Pairing Free Identity-based Two-Party Authenticated Key Agreement protocol and gather the implementation results for Wireless Sensor Networks on MICAz mote by using Relic-toolkit cryptographic library. The proposed protocol is efficient as it does not use any pairing operation and only uses three scalar point multiplications. The security of the protocol has been proved secure using strongest security model for identity-based key agreement protocol presented by Liang et al.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.

    Article  MathSciNet  MATH  Google Scholar 

  2. Smart, N. (2002). Identity-based authenticated key agreement protocol based on weil pairing. Electronics Letters, 38(13), 630–632.

    Article  MATH  Google Scholar 

  3. Boneh, D., & Franklin, M. (2001) Identity-based encryption from the weil pairing. In Advances in cryptology CRYPTO 2001, volume 2139 of lecture notes in computer science (pp. 213–229). Berlin: Springer. doi:10.1007/3-540-44647-8_13.

  4. Chen, L., & Kudla, C. (2003). Identity based authenticated key agreement protocols from pairings. In Proceedings of the 16th IEEE computer security foundations workshop, 2003, pp. 219–233.

  5. Shim, K. (2003). Efficient ID-based authenticated key agreement protocol based on weil pairing. Electronics Letters, 39(8), 653–654.

    Article  Google Scholar 

  6. Xun, Y. (2003). Efficient ID-based key agreement from weil pairing. Electronics Letters, 39(2), 206–208.

    Article  Google Scholar 

  7. Sun, H., & Hsieh, B. (2003). Security analysis of shim’s authenticated key agreement protocols from pairings. Cryptology ePrint Archive, Report 2003/113. http://eprint.iacr.org/.

  8. Boyd, C., & Choo, K. (2005). Security of two-party identity-based key agreement. In Progress in cryptology mycrypt 2005, volume 3715 of lecture notes in computer science (pp. 229–243). Berlin: Springer. doi:10.1007/11554868_17.

  9. Ryu, E., Yoon, E., & Yoo, K. An efficient id-based authenticated key agreement protocol from pairings. In Networking 2004, volume 3042 of lecture notes in computer science (pp. 1458–1463). Berlin: Springer. doi:10.1007/978-3-540-24693-0_135.

  10. Wang S., Cao Z., Choo K., & Wang L. (2009). An improved identity-based key agreement protocol and its security proof. Information Sciences, 179(3):307–318. http://www.sciencedirect.com/science/article/pii/S002002550800399X.

  11. McCullagh, N., & Barreto, P. (2005). A new two-party identity-based authenticated key agreement. In Topics in cryptology CT-RSA 2005, volume 3376 of lecture notes in computer science (pp. 262–274). Berlin: Springer. doi:10.1007/978-3-540-30574-3_18.

  12. Xie, G. (2004). Cryptanalysis of noel mccullagh and paulo s. l. m. barretos two-party identity-based key agreement. Cryptology ePrint Archive, Report 2004/308. http://eprint.iacr.org/.

  13. Li, S., Yuan, Q., & Li, J. (2005). Towards security two-part authenticated key agreement protocols. IACR Eprint archive. http://eprint.iacr.org/2005/300.

  14. Zhu, R., Yang, G., & Wong, D. (2007). An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices. Theoretical Computer Science, 378(2):198–207. http://www.sciencedirect.com/science/article/pii/S0304397507001120.

  15. Cao, X., Kou, W., Yu, Y., & Sun, R. (2008). Identity-based authentication key agreement protocols without bilinear pairings. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91A(12):38333836. https://www.jstage.jst.go.jp/article/transfun/E91.A/12/E91.A_12_3833/_article.

  16. Cao, X., Kou, W., & Du, X. (2010). A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Information Sciences, 180(15):2895–2903. http://www.sciencedirect.com/science/article/pii/S0020025510001519.

  17. Kudla, C., & Paterson, K. (2005). Modular security proofs for key agreement protocols. Advances in cryptology—ASIACRYPT 2005, volume 3788 of lecture notes in computer science (pp. 549–565) Berlin: Springer.

  18. Hafizul, S., & Biswas, G. (2012). An improved pairing-free identity-based authenticated key agreement protocol based on ECC. Procedia Engineering, 30, 499–507. International conference on communication technology and system design 2011.

    Article  Google Scholar 

  19. Blake, S., Johnson, D., & Menezes, A. (1997). Key agreement protocols and their security analysis. Crytography and Coding, volume 1355 of Lecture Notes in Computer Science (pp. 30–45). Berlin: Springer.

  20. Levis, P., Madden, S., Polastre, J., Szewczyk, R., Whitehouse, K., Woo, A., et al. (2005). Tinyos: An operating system for sensor networks. In Ambient intelligence (pp. 115–148). Berlin: Springer. doi:10.1007/3-540-27139-2_7.

  21. Aranha, D., & Gouvêa, C. RELIC is an efficient library for cryptography. http://code.google.com/p/relic-toolkit/.

  22. Rev. A. Mpr-mib series user manual. http://www-db.ics.uci.edu/pages/research/quasar/MPR-MIB%20Series%20User%20Manual%207430-0021-06_A.pdf, 2004.

  23. Liang, N., Gongliang, C., & Jianhua, L. (2013). Escrowable identity-based authenticated key agreement protocol with strong security. Computers & Mathematics with Applications, 65(9), 1339–1349. Advanced Information Security.

    Article  MathSciNet  Google Scholar 

  24. LaMacchia, B., Lauter, K., & Mityagin, A. (2007). Stronger security of authenticated key exchange. In Provable security, volume 4784 of lecture notes in computer science (pp. 1–16). Berlin: Springer. doi:10.1007/978-3-540-75670-5_1.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Suman Bala.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bala, S., Sharma, G. & Verma, A.K. PF-ID-2PAKA: Pairing Free Identity-Based Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks. Wireless Pers Commun 87, 995–1012 (2016). https://doi.org/10.1007/s11277-015-2626-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2626-5

Keywords