skip to main content
10.1145/3586102.3586123acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccnsConference Proceedingsconference-collections
research-article

A mutual authentication and key establishment scheme for peer to peer network scenario

Published: 24 July 2023 Publication History

Abstract

Due to the lack of capability of solving computationally hard problems and the lack of high processing power by one single entity. Swarm robotics emerge, a group of individual robotics shares their processing resources to solve a complicated problem. Authentication schemes within the peer robotics are necessary, especially when the swarm robotics is sent out for different tasks. In this study, an authentication and key establishment scheme specially designed for peer-to-peer networks is proposed. The proposed scheme enables authentication between two registered peer entities directly without the help of a trusted server, after authentication, two peer robotics can build a secure two-way communication channel in a public environment. Security analysis shows that this scheme is secure, compared to related works the proposed scheme has more security features. In addition, our experiment results show the proposed scheme is efficient compared to related works.

References

[1]
W. Meng, Z. He, R. Su, P. K. Yadav, R. Teo, and L. Xie, ‘Decentralized Multi-UAV Flight Autonomy for Moving Convoys Search and Track’, IEEE Transactions on Control Systems Technology, vol. 25, no. 4, pp. 1480–1487, Jul. 2017.
[2]
F. Koohifar, A. Kumbhar, and I. Guvenc, ‘Receding Horizon Multi-UAV Cooperative Tracking of Moving RF Source’, IEEE Communications Letters, vol. 21, no. 6, pp. 1433–1436, Jun. 2017.
[3]
V. Sridhar and A. Manikas, “Target Tracking with a Flexible UAV Cluster Array,” in 2016 IEEE Globecom Workshops (GC Wkshps), 2016, pp. 1–6.
[4]
X. C. Ding, A. R. Rahmani, and M. Egerstedt, ‘Multi-UAV Convoy Protection: An Optimal Approach to Path Planning and Coordination’, IEEE Transactions on Robotics, vol. 26, no. 2, pp. 256–268, Apr. 2010.
[5]
J. Liu, Z. Zhang, X. Chen, and K. S. Kwak, ‘Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks’, IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 332–342, Feb. 2014.
[6]
J. Liu, L. Zhang, and R. Sun, ‘1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks’, Sensors, vol. 16, no. 5, p. 728, May 2016.
[7]
H. Xiong, ‘Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol’, IEEE Transactions on Information Forensics and Security, vol. 9, no. 12, pp. 2327–2339, Dec. 2014.
[8]
H. Xiong and Z. Qin, ‘Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks’, IEEE Transactions on Information Forensics and Security, vol. 10, no. 7, pp. 1442–1455, Jul. 2015.
[9]
D. Wang, N. Wang, P. Wang, and S. Qing, ‘Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity’, Information Sciences, vol. 321, pp. 162–178, Nov. 2015.
[10]
J. L. Tsai and N. W. Lo, ‘A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services’, IEEE Systems Journal, vol. 9, no. 3, pp. 805–815, Sep. 2015.
[11]
Q. Jiang, J. Ma, and F. Wei, “On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services,” IEEE Systems Journal, vol. 12, no. 2, pp. 2039–2042, Jun. 2018.
[12]
D. He, N. Kumar, M. K. Khan, L. Wang, and J. Shen, “Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services,” IEEE Systems Journal, vol. 12, no. 2, pp. 1621–1631, Jun. 2018.
[13]
X. Li, J. Peng, S. Kumari, F. Wu, M. Karuppiah, and K.-K. Raymond Choo, ‘An enhanced 1-round authentication protocol for wireless body area networks with user anonymity’, Computers & Electrical Engineering.
[14]
S. Kumari, S. A. Chaudhry, F. Wu, X. Li, M. S. Farash, and M. K. Khan, ‘An improved smart card based authentication scheme for session initiation protocol’, Peer-to-Peer Netw. Appl., vol. 10, no. 1, pp. 92–105, Jan. 2017.
[15]
D. He and D. Wang, ‘Robust Biometrics-Based Authentication Scheme for Multiserver Environment’, IEEE Systems Journal, vol. 9, no. 3, pp. 816–823, Sep. 2015.
[16]
Y. Liu, Y. Wang, and G. Chang, ‘Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm’, IEEE Transactions on Intelligent Transportation Systems, vol. 18, no. 10, pp. 2740–2749, Oct. 2017.
[17]
H. Zhu, T. Liu, G. Wei, and H. Li, ‘PPAS: privacy protection authentication scheme for VANET’, Cluster Comput, vol. 16, no. 4, pp. 873–886, Dec. 2013.
[18]
S. A. Chaudhry, M. T. Khan, M. K. Khan, and T. Shon, ‘A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography’, J Med Syst, vol. 40, no. 11, p. 230, Nov. 2016.
[19]
F. Wu, L. Xu, S. Kumari, and X. Li, ‘A new and secure authentication scheme for wireless sensor networks with formal proof’, Peer-to-Peer Netw. Appl., vol. 10, no. 1, pp. 16–30, Jan. 2017.
[20]
X. Li, M. H. Ibrahim, S. Kumari, A. K. Sangaiah, V. Gupta, and K.-K. R. Choo, ‘Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks’, Computer Networks. Volume 129, Part 2, pp. 429-443, Dec. 2017,
[21]
M. H. Ibrahim, S. Kumari, A. K. Das, M. Wazid, and V. Odelu, “Secure anonymous mutual authentication for star two-tier wireless body area networks,” Computer Methods and Programs in Biomedicine, vol. 135, pp. 37–50, Oct. 2016.
[22]
A. K. Das, ‘A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks’, Peer-to-Peer Netw. Appl., vol. 9, no. 1, pp. 223–244, Jan. 2016.
[23]
Y.-F. Chang, S.-H. Yu, and D.-R. Shiao, ‘A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care’, J Med Syst, vol. 37, no. 2, p. 9902, Apr. 2013.
[24]
M. Turkanović, B. Brumen, and M. Hölbl, ‘A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion’, Ad Hoc Networks, vol. 20, pp. 96–112, Sep. 2014.
[25]
S. H. Islam and G. P. Biswas, “A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication,” Journal of King Saud University - Computer and Information Sciences, vol. 29, no. 1, pp. 63–73, Jan. 2017.
[26]
S. H. Islam and G. P. Biswas, ‘Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys’, Wireless Pers Commun, vol. 82, no. 4, pp. 2727–2750, Jun. 2015.
[27]
M. Wazid, ‘Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks’, IEEE Access, vol. 5, pp. 14966–14980, 2017.
[28]
Mohammad Sabzinejad Farash, “An Efficient User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Network Tailored for the Internet of Things Environment,” Ad Hoc Networks 36, Part 1 (January 2016): 152–76.
[29]
P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, ‘PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications’, International Journal of Distributed Sensor Networks, vol. 2014, p. e357430, Jul. 2014.
[30]
K. Mahmood, S. A. Chaudhry, H. Naqvi, S. Kumari, X. Li, and A. K. Sangaiah, “An elliptic curve cryptography based lightweight authentication scheme for smart grid communication,” Future Generation Computer Systems, vol. 81, pp. 557–565, Apr. 2018.
[31]
D. Abbasinezhad-Mood and M. Nikooghadam, “Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications,” Future Generation Computer Systems, vol. 84, pp. 47–57, Jul. 2018.
[32]
Y. Chen, ‘ECC-Based Authenticated Key Agreement Protocol for Industrial Control System’, IEEE Internet of Things Journal, pp. 1–1, 2022.
[33]
T.-Y. Wu, Y.-Q. Lee, C.-M. Chen, Y. Tian, and N. A. Al-Nabhan, ‘An enhanced pairing-based authentication scheme for smart grid communications’, J Ambient Intell Human Comput, Jan. 2021.
[34]
http://gas.dia.unisa.it/projects/jpbc/#.Wc0m51uCyUl
[35]
https://github.com/SevenBruce/JPBC

Index Terms

  1. A mutual authentication and key establishment scheme for peer to peer network scenario

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCNS '22: Proceedings of the 2022 12th International Conference on Communication and Network Security
    December 2022
    241 pages
    ISBN:9781450397520
    DOI:10.1145/3586102
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 July 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. elliptic curve cryptography
    2. key establishment
    3. mutual authentication
    4. network security
    5. peer to peer network

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    • R&D Program of Beijing Municipal Education Commission
    • Major Research Plan of the National Natural Science Foundation of China

    Conference

    ICCNS 2022

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 27
      Total Downloads
    • Downloads (Last 12 months)6
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 17 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media