Advertisement

Universally Verifiable Certificateless Signcryption Scheme for MANET

  • Susmita Mandal
  • Sujata Mohanty
  • Banshidhar Majhi
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 453)

Abstract

The mobile ad hoc network (MANET) is a collection of wireless mobile nodes that communicate with one another through a standard transmission medium such as Wi-Fi, cellular, or satellite communication. However, their basic characteristics make them vulnerable against numerous attacks accordingly raising the need of security. In this paper, we propose a certificateless signcryption scheme based on the difficulty of solving the Diffie–Hellman problem. The simulation result proves that the scheme is secure against active and passive attacks using AVISPA (Automated Validation of Internet Security Protocols and Applications) tool.

Keywords

Mobile ad hoc network Certificateless signcryption AVISPA tool 

References

  1. 1.
    I. Chlamtac, M. Conti, J.J.N. Liu, Mobile ad hoc networking: imperatives and challenges. Ad Hoc Netw. 1(1), 13–64 (2003)CrossRefGoogle Scholar
  2. 2.
    P.M. Jawandhiya et al., A survey of mobile ad hoc network attacks. Int. J. Eng. Sci. Technol. 2.9, 4063–4071 (2010)Google Scholar
  3. 3.
    A. Shamir, Identity-based cryptosystems and signature schemes, in Advances in cryptology (Springer, Berlin Heidelberg, 1985)Google Scholar
  4. 4.
    Y. Zhang et al., Securing mobile ad hoc networks with certificateless public keys. Dependable Secure Comput. IEEE Trans. 3(4), 386–399 (2006)Google Scholar
  5. 5.
    Z. Zhang, W. Susilo, R. Raad, Mobile ad-hoc network key management with certificateless cryptography, in 2nd International Conference on Signal Processing and Communication Systems, 2008. ICSPCS 2008 (IEEE, 2008)Google Scholar
  6. 6.
    X. Boyen, Multipurpose identity-based signcryption, in Advances in Cryptology-CRYPTO 2003 (Springer, Berlin Heidelberg, 2003), pp. 383–399Google Scholar
  7. 7.
    L. Chen, J. Malone-Lee, Improved identity-based signcryption, in Public Key Cryptography-PKC 2005 (Springer, Berlin Heidelberg, 2005), pp. 362–379Google Scholar
  8. 8.
    S.S. Al-Riyami, K.G. Paterson, Certificateless public key cryptography, in Advances in Cryptology-ASIACRYPT 2003 (Springer, Berlin Heidelberg, 2003), pp. 452–473Google Scholar
  9. 9.
    Y. Zheng, Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption), in Advances in Cryptology—CRYPTO’97 (Springer, Berlin Heidelberg, 1997), pp. 165–179Google Scholar
  10. 10.
    X. Lv, H. Li, B. Wang, Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks. Secur. Commun. Netw. 6(1), 49–57 (2013)CrossRefGoogle Scholar
  11. 11.
    M. Barbosa, P. Farshim, Certificateless signcryption, in Proceedings of the 2008 ACM symposium on Information, computer and communications security (ACM, 2008)Google Scholar
  12. 12.
    W.-H. Liu, C.-X. Xu, Certificateless signcryption scheme without bilinear pairing. Ruanjian Xuebao J. Softw. 22(8), 1918–1926 (2011)MathSciNetCrossRefGoogle Scholar
  13. 13.
    W. Xie, Z. Zhang, Efficient and provably secure certificateless signcryption from bilinear maps, in IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), 2010 (IEEE, 2010)Google Scholar
  14. 14.
    D-B. He, Security analysis of a certificateless signcryption scheme. Ruanjian Xuebao J. Softw. 24(3), 618–622 (2013)Google Scholar
  15. 15.
    W. Shi et al., Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing. Front. Comput. Sci. 8(4), 656–666 (2014)Google Scholar
  16. 16.
    B. Wang, J. Li, (t, n) Threshold signature scheme without a trusted party. Chin. J. Comput. 26(11), 1581–1584 (2003). (Chinese Edition)MathSciNetGoogle Scholar
  17. 17.
    L.-C. Li, R.-S. Liu, Securing cluster-based ad hoc networks with distributed authorities. Wirel. Commun. IEEE Trans. 9(10), 3072–3081 (2010)CrossRefGoogle Scholar
  18. 18.
    H. Lee et al., ID-based key management scheme using threshold decryption for OPMD environment, in IEEE International Conference on Consumer Electronics (ICCE), 2012 (IEEE, 2012)Google Scholar
  19. 19.
    F. Miao et al., Fully self-Organized Key management scheme in MANET and its applications, in Computer Networks & Communications (NetCom) (Springer, New York, 2013), pp. 381–391Google Scholar
  20. 20.
    AVISPA, Automated validation of internet security protocols and applications. http://www.avispa-project.org/. Accessed on Sept 2015
  21. 21.
    L. Vigan, Automated security protocol analysis with the AVISPA tool. Electron. Notes Theor. Comput. Sci. 155, 61–86 (2006)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Susmita Mandal
    • 1
  • Sujata Mohanty
    • 1
  • Banshidhar Majhi
    • 1
  1. 1.Department of Computer Science and EngineeringNational Institute of Technology RourkelaRourkelaIndia

Personalised recommendations