Abstract
In order to deal with drastically increasing mobile traffic these days, device to device connection (D2D) which provides infra-connection’s off-loading is getting a lot of attention. However, we observed that most of the current D2D protocols such as Bluetooth and Wi-Fi Direct are not scalable, and vulnerable to main-in-the-middle (MITM) and replay attacks in mobile multi-hop networks. In this paper, we propose novel D2D authentication protocols with a secure initial key establishment using ciphertext-policy attribute-based encryption(CP-ABE) to solve this problem. By exploiting CP-ABE, the proposed scheme allows the communicating parties to mutually authenticate each other and derive the link key in an expressive and secure way in the multi-hop network environment. According to the analysis results, the proposed scheme is secure against MITM and replay attacks in the D2D mobile multi-hop networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
CISCO: Cosco Visual Netowking Index: Global Mobile Data Traffic Forecast Update, 2013-2018. White paper (2014)
IEEE 802.15 WPAN Task Group8 Peer Aware Communications, http://www.ieee802.org/15/pub/TG8.html
3GPP: Feasibility Study on Proximity-based Services. Technical report, 3GPP (2012)
Lee, C.: Bluetooth Security Protocol Analysis and Improvements. M.Sc. thesis at San Jose State University (2006), http://www.cs.sjsu.edu/faculty/stamp/students/cs298ReportSteven.pdf
Camps-Mur, D., Garcia-Saavedra, A., Serrano, P.: Device-to-Device communications with Wi-Fi Direct: overview and experimentation. IEEE Wireless Commun 20(3), 96–104 (2013)
Perkins, C.: Ad Hoc Networking, pp. 1–23. Addison Wesley Professional, Indianapolis (2000)
Bruno, R., Conti, M., Gregori, E.: Mesh Networks: Commodity Multihop Ad Hoc Networks. IEEE Communications Magazine 43(3) (2005)
Estrin, D., Girod, L., Pottie, G., Srivastava, M.: Instrumenting the world with wireless sensor networks. In: International Conference on Acoustics, Speech and Signal Processing (ICASSP 2001), Salt Lake City, Utah (2001)
Kwon, H., Shin, J., Lee, B., Choi, J., Nam, S., Lim, S.: Technical Trends on Mobile Ad Hoc Networks. Electronics and Telecommunications Trends 18, 11–24 (2003)
Corson, M., Macker, J.: Mobile Ad hoc Networking(MANET): Routing Protocol Performance Issues and Evaluation Considerations. IETF RFC 2501 (1999)
Mahmoud, M., Shen, X.: Anonymous and Authenticated Routing in Multi- Hop Cellular Networks. In: IEEE International Conference on Communications, pp. 1–6 (2009)
Lee, Y., Lee, H., Lee, G., Kim, H., Jeong, C.: Design of hybrid authentication scheme and key distribution for mobile multi-hop relay in IEEE 802.16j. In: Euro American Conference on Telematics and Information Systems: New Opportunities to Increase Digital Citizenship, (12) (2009)
Huang, J., Huang, C.: Secure Mutual Authentication Protocols for Mobile Multi-hop Relay WIMAX Networks against Rogue Base/Relay Stations. In: 2011 IEEE International Conference on Communications, pp. 1–5 (2011)
Zhu, X., Xu, S.: A new authentication scheme for wireless Ad Hoc Network. 2012 Information Management, Innovation Management and Industrial Engineering 2, 312–315 (2012)
Khalil, I., Bataineh, S., Qubajah, L., Khreishah, A.: Distributed secure routing protocol for Mobile Ad-Hoc Networks. In: 2013 Computer Science and Information Technology, pp. 106–110 (2013)
Kügler, D.: Man in the Middle Attacks on Bluetooth. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 149–161. Springer, Heidelberg (2003)
IEEE Computer Society LAN MAN Standards Committee: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Technical report. IEEE Computer Society LAN MAN Standards Committee (1997)
Wi-Fi Alliance: Quality of Service (QoS) Task Group, Wi-Fi Multi-media(including WMM PowerSave) Specification v1.1 (2005)
Wi-Fi Alliance: Wi-Fi Protected Setup Specification, Wi-Fi Alliance Document (2007)
Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)
Shamir, A.: Identity-based crptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Cocks, C.: An Identity Based Encryption Scheme based on Quadratic Residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360–363. Springer, Heidelberg (2001)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-Policy Attribute-Based Encryption. In: IEEE Symposium on Security and Privacy(SP 007), pp. 321–334 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Kwon, H., Hahn, C., Kim, D., Kang, K., Hur, J. (2014). Secure Device-to-Device Authentication in Mobile Multi-hop Networks. In: Cai, Z., Wang, C., Cheng, S., Wang, H., Gao, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2014. Lecture Notes in Computer Science, vol 8491. Springer, Cham. https://doi.org/10.1007/978-3-319-07782-6_25
Download citation
DOI: https://doi.org/10.1007/978-3-319-07782-6_25
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07781-9
Online ISBN: 978-3-319-07782-6
eBook Packages: Computer ScienceComputer Science (R0)