Skip to main content

Secure Device-to-Device Authentication in Mobile Multi-hop Networks

  • Conference paper
Wireless Algorithms, Systems, and Applications (WASA 2014)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8491))

Abstract

In order to deal with drastically increasing mobile traffic these days, device to device connection (D2D) which provides infra-connection’s off-loading is getting a lot of attention. However, we observed that most of the current D2D protocols such as Bluetooth and Wi-Fi Direct are not scalable, and vulnerable to main-in-the-middle (MITM) and replay attacks in mobile multi-hop networks. In this paper, we propose novel D2D authentication protocols with a secure initial key establishment using ciphertext-policy attribute-based encryption(CP-ABE) to solve this problem. By exploiting CP-ABE, the proposed scheme allows the communicating parties to mutually authenticate each other and derive the link key in an expressive and secure way in the multi-hop network environment. According to the analysis results, the proposed scheme is secure against MITM and replay attacks in the D2D mobile multi-hop networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. CISCO: Cosco Visual Netowking Index: Global Mobile Data Traffic Forecast Update, 2013-2018. White paper (2014)

    Google Scholar 

  2. IEEE 802.15 WPAN Task Group8 Peer Aware Communications, http://www.ieee802.org/15/pub/TG8.html

  3. 3GPP: Feasibility Study on Proximity-based Services. Technical report, 3GPP (2012)

    Google Scholar 

  4. Lee, C.: Bluetooth Security Protocol Analysis and Improvements. M.Sc. thesis at San Jose State University (2006), http://www.cs.sjsu.edu/faculty/stamp/students/cs298ReportSteven.pdf

  5. Camps-Mur, D., Garcia-Saavedra, A., Serrano, P.: Device-to-Device communications with Wi-Fi Direct: overview and experimentation. IEEE Wireless Commun 20(3), 96–104 (2013)

    Article  Google Scholar 

  6. Perkins, C.: Ad Hoc Networking, pp. 1–23. Addison Wesley Professional, Indianapolis (2000)

    Google Scholar 

  7. Bruno, R., Conti, M., Gregori, E.: Mesh Networks: Commodity Multihop Ad Hoc Networks. IEEE Communications Magazine 43(3) (2005)

    Google Scholar 

  8. Estrin, D., Girod, L., Pottie, G., Srivastava, M.: Instrumenting the world with wireless sensor networks. In: International Conference on Acoustics, Speech and Signal Processing (ICASSP 2001), Salt Lake City, Utah (2001)

    Google Scholar 

  9. Kwon, H., Shin, J., Lee, B., Choi, J., Nam, S., Lim, S.: Technical Trends on Mobile Ad Hoc Networks. Electronics and Telecommunications Trends 18, 11–24 (2003)

    Google Scholar 

  10. Corson, M., Macker, J.: Mobile Ad hoc Networking(MANET): Routing Protocol Performance Issues and Evaluation Considerations. IETF RFC 2501 (1999)

    Google Scholar 

  11. Mahmoud, M., Shen, X.: Anonymous and Authenticated Routing in Multi- Hop Cellular Networks. In: IEEE International Conference on Communications, pp. 1–6 (2009)

    Google Scholar 

  12. Lee, Y., Lee, H., Lee, G., Kim, H., Jeong, C.: Design of hybrid authentication scheme and key distribution for mobile multi-hop relay in IEEE 802.16j. In: Euro American Conference on Telematics and Information Systems: New Opportunities to Increase Digital Citizenship, (12) (2009)

    Google Scholar 

  13. Huang, J., Huang, C.: Secure Mutual Authentication Protocols for Mobile Multi-hop Relay WIMAX Networks against Rogue Base/Relay Stations. In: 2011 IEEE International Conference on Communications, pp. 1–5 (2011)

    Google Scholar 

  14. Zhu, X., Xu, S.: A new authentication scheme for wireless Ad Hoc Network. 2012 Information Management, Innovation Management and Industrial Engineering 2, 312–315 (2012)

    MathSciNet  Google Scholar 

  15. Khalil, I., Bataineh, S., Qubajah, L., Khreishah, A.: Distributed secure routing protocol for Mobile Ad-Hoc Networks. In: 2013 Computer Science and Information Technology, pp. 106–110 (2013)

    Google Scholar 

  16. Kügler, D.: Man in the Middle Attacks on Bluetooth. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 149–161. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  17. IEEE Computer Society LAN MAN Standards Committee: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Technical report. IEEE Computer Society LAN MAN Standards Committee (1997)

    Google Scholar 

  18. Wi-Fi Alliance: Quality of Service (QoS) Task Group, Wi-Fi Multi-media(including WMM PowerSave) Specification v1.1 (2005)

    Google Scholar 

  19. Wi-Fi Alliance: Wi-Fi Protected Setup Specification, Wi-Fi Alliance Document (2007)

    Google Scholar 

  20. Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  21. Shamir, A.: Identity-based crptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  22. Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  23. Cocks, C.: An Identity Based Encryption Scheme based on Quadratic Residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360–363. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  24. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-Policy Attribute-Based Encryption. In: IEEE Symposium on Security and Privacy(SP 007), pp. 321–334 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Kwon, H., Hahn, C., Kim, D., Kang, K., Hur, J. (2014). Secure Device-to-Device Authentication in Mobile Multi-hop Networks. In: Cai, Z., Wang, C., Cheng, S., Wang, H., Gao, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2014. Lecture Notes in Computer Science, vol 8491. Springer, Cham. https://doi.org/10.1007/978-3-319-07782-6_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07782-6_25

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07781-9

  • Online ISBN: 978-3-319-07782-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics