skip to main content
10.1145/3409390.3409392acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicppConference Proceedingsconference-collections
research-article

Randomized Authentication using IBE for Opportunistic Networks

Published:17 August 2020Publication History

ABSTRACT

Opportunistic networks (ONs) are widely used in many critical network applications, and security/privacy issues in ONs are critical for its wide adaption. In this paper, we propose a randomized authentication protocol which consists of node registration and authentication phases using identity-based encpryption (IBE) and trust framework. The key ideas of our authentication protocol are to generate public keys from publicly available node IDs, and not only central registration server but also the nodes with a high trust value can authenticate nodes in a network. By doing this, our protocol is of light-weight and the authentication process is randomized in a distributed way. In addition, to accommodate the disadvantage of IBE, we introduce the idea of distributed KGCs (key generation centers) and the trust framework. The protocol level security of the proposed scheme is proven by indistinguishability-based provable security analysis using random oracles, and the qualitative security analyses for various attacks are conducted.

References

  1. N Asokan, Kari Kostiainen, Philip Ginzboorg, Jörg Ott, and Cheng Luo. 2007. Applicability of identity-based cryptography for disruption-tolerant networking. In MobiSys. 52–56.Google ScholarGoogle Scholar
  2. Yue Bai and Jianbo Xu. 2018. Access control scheme based on fuzzy identity in opportunistic network. Procedia Comput. Sci. 131 (2018), 1122–1127.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Dan Boneh and Matt Franklin. 2001. Identity-based encryption from the Weil pairing. In CRYPTO. Springer, 213–229.Google ScholarGoogle Scholar
  4. Ms Priyanka Bubna and Parul Bhanarkar Jha. 1984. Comparative analysis of Identity-based encryption with traditional public key encryption in wireless network. IEEE Commun. Mag. (1984), 196–205.Google ScholarGoogle Scholar
  5. Craig Gentry and Alice Silverberg. 2002. Hierarchical ID-based cryptography. In ASIACRYPT. Springer, 548–566.Google ScholarGoogle Scholar
  6. Maggi Goyal and Manoj Chaudhary. 2013. Ensuring privacy in opportunistic network. Int. J. Comput. Appl. 76, 4 (2013), 11–17.Google ScholarGoogle Scholar
  7. Shohei Karaguchi, Kazuya Sakai, and Satoshi Fukumoto. 2018. Quality-Aware Task Assignment in Opportunistic Network-Based Crowdsourcing. In IPCCC. IEEE, 1–7.Google ScholarGoogle Scholar
  8. Dmytro Karamshuk, Chiara Boldrini, Marco Conti, and Andrea Passarella. 2011. Human mobility models for opportunistic networks. IEEE Commun. Mag. 49, 12 (2011), 157–165.Google ScholarGoogle ScholarCross RefCross Ref
  9. Aniket Kate, Gregory M Zaverucha, and Urs Hengartner. 2007. Anonymity and security in delay tolerant networks. In SecureComm. IEEE, 504–513.Google ScholarGoogle Scholar
  10. Hieu Le Xuan, Ideguchi Tetsuo, Okuda Takashi, and Tian Xuejun. 2014. A proposal of inter-vehicle (road-vehicle) authentication method using ID-based encryption and its Evaluation. In GN Workshop. 1–7.Google ScholarGoogle Scholar
  11. Yaozhou Ma and Abbas Jamalipour. 2010. Opportunistic node authentication in intermittently connected mobile ad hoc networks. In APCC. IEEE, 453–457.Google ScholarGoogle Scholar
  12. Ryota Mizuhara, Kazuya Sakai, and Satoshi Fukumoto. 2018. A collaborative-task assignment algorithm for mobile crowdsourcing in opportunistic networks. In ICC. IEEE, 1–6.Google ScholarGoogle Scholar
  13. Luciana Pelusi, Andrea Passarella, and Marco Conti. 2006. Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Commun. Mag. 44, 11 (2006), 134–141.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Ronald L Rivest, Adi Shamir, and Leonard Adleman. 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (1978), 120–126.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Kazuya Sakai, Min-Te Sun, Wei-Sshinn Ku, and Ten H. Lai. 2013. Randomized Skip Lists-Based Private Authentication for Large-Scale RFID Systems. In MobiHoc. 277–280.Google ScholarGoogle Scholar
  16. Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku, and Ten H. Lai. 2019. On The Performance Bound of Structured Key-Based RFID Authentication. (2019), 1–9.Google ScholarGoogle Scholar
  17. Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku, and Jie Wu. 2017. A framework for anonymous routing in delay tolerant networks. In ICNP. IEEE, 1–10.Google ScholarGoogle Scholar
  18. Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku, and Jie Wu. 2018. On anonymous routing in delay tolerant networks. IEEE Trans. Mobile Comput. 18, 12 (2018), 2926–2940.Google ScholarGoogle ScholarCross RefCross Ref
  19. Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku, Jie Wu, and Faisal S Alanazi. 2016. An analysis of onion-based anonymous routing for delay tolerant networks. In ICDCS. IEEE, 609–618.Google ScholarGoogle Scholar
  20. Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku, Jie Wu, and Faisal S Alanazi. 2017. Performance and security analyses of onion-based anonymous routing for delay tolerant networks. IEEE Trans. Mobile Comput. 16, 12 (2017), 3473–3487.Google ScholarGoogle ScholarCross RefCross Ref
  21. Adi Shamir. 1984. Identity-based cryptosystems and signature schemes. In ASIACRYPT. Springer, 47–53.Google ScholarGoogle Scholar
  22. Umesh Pal Singh and Naveen Chauhan. 2017. Authentication using trust framework in opportunistic networks. In ICCCNT. IEEE, 1–7.Google ScholarGoogle Scholar
  23. Min-Te Sun, Kazuya Sakai, Wei-Shinn Ku, Ten H. Lai, and Athanasios V. Vasilakos. 2016. Private and Secure Tag Access for Large-Scale RFID Systems. IEEE Trans. Dependable Secur. Comput. 13, 6 (2016), 657–671.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Yue Wu, Yimeng Zhao, Michel Riguidel, Guanghao Wang, and Ping Yi. 2015. Security and trust management in opportunistic networks: a survey. Secur. Commun. Netw. 8, 9 (2015), 1812–1827.Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICPP Workshops '20: Workshop Proceedings of the 49th International Conference on Parallel Processing
    August 2020
    186 pages
    ISBN:9781450388689
    DOI:10.1145/3409390

    Copyright © 2020 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 17 August 2020

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate91of313submissions,29%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format