Advertisement

Enhanced Authentication and Key Agreement Mechanism Using PKI

  • Krishna Prakasha
  • Pratheeksha Gowda
  • Vasundhara AcharyaEmail author
  • Balachandra Muniyal
  • Mayank Khandelwal
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 950)

Abstract

Entity Authentication and Key Agreement (AKA), is a critical cryptographic problem in wireless communication, where a mutual entity authentication plays a vital role in the establishment of the secure and authentic connection. The paper proposes an efficient authenticated key agreement scheme and increases the speed of authentication process more securely. The signaling overhead is minimized by creating the validity token at home agent of mobile equipment, which indicates if the certificate of the foreign agent is valid or invalid. An efficient way for the implementation of an enhanced version of the protocol is proposed. NTRU algorithm is applied to encrypt and decrypt the messages. NTRU algorithm is one of the efficient asymmetric key lattice-based cryptographic algorithm. NTRU has been proved to be the fastest and secure encryption algorithm. AES is used for symmetric key encryption. The result demonstrates that the proposed method is efficient.

Keywords

AKA NTRU OCSP PKI WPKI Wireless communication 

References

  1. 1.
    Albasheer, M.O., Bashier, E.B.M.: Enhanced model for PKI certificate validation in the mobile banking. In: 2013 International Conference on Computing, Electrical and Electronic Engineering (ICCEEE), pp. 470–476, August 2013Google Scholar
  2. 2.
    Bai, T., Davis, S., Li, J., Jiang, H.: Analysis and acceleration of NTRU lattice-based cryptographic system. In: 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), pp. 1–6, June 2014Google Scholar
  3. 3.
    Bhandari, R., Choudhary, A.: 3GPP AKA protocol: simplified authentication process. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(12), 655–658 (2014)Google Scholar
  4. 4.
    Forouzan, B.A.: Cryptography and Network Security, 1st edn. McGraw-Hill Inc., New York (2008)Google Scholar
  5. 5.
    Gururaj, H.L., Sunitha, R., Ramesh, B.: Enhanced authentication technique for next generation 3GPP networks. In: 2014 International Conference on Contemporary Computing and Informatics (IC3I), pp. 1361–1365, November 2014Google Scholar
  6. 6.
    Hoffstein, J., Pipher, J., Schanck, J.M., Silverman, J.H., Whyte, W., Zhang, Z.: Choosing parameters for NTRUEncrypt. In: Handschuh, H. (ed.) CT-RSA 2017. LNCS, vol. 10159, pp. 3–18. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-52153-4_1CrossRefGoogle Scholar
  7. 7.
    Jiang, S., Zhu, X., Wang, L.: An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Trans. Intell. Transp. Syst. 17(8), 2193–2204 (2016)CrossRefGoogle Scholar
  8. 8.
    Khan, W., Ullah, H.: Authentication and secure communication in GSM, GPRS, and UMTS using asymmetric cryptography. Int. J. Comput. Sci. Issues (IJCSI) 7(3), 10 (2010)Google Scholar
  9. 9.
    Micciancio, D., Regev, O.: Lattice-based cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 147–191. Springer, Berlin (2009).  https://doi.org/10.1007/978-3-540-88702-7_5CrossRefzbMATHGoogle Scholar
  10. 10.
    El Moustaine, E., Laurent, M.: A lattice based authentication for low-cost RFID. In: 2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA), pp. 68–73, November 2012Google Scholar
  11. 11.
    Munoz, J.L., Forne, J., Castro, J.C.: Evaluation of certificate revocation policies: OCSP vs. Overissued-CRL. In: Proceedings of the 13th International Workshop on Database and Expert Systems Applications, pp. 511–515, September 2002Google Scholar
  12. 12.
    Nguyen, H.B.: An overview of the NTRU cryptographic system. Ph.D. thesis, San Diego State University (2014)Google Scholar
  13. 13.
    Park, S.W., Lee, I.Y.: Anonymous authentication scheme based on NTRU for the protection of payment information in NFC mobile environment. J. Inf. Process. Syst. 9(3), 461–476 (2013)CrossRefGoogle Scholar
  14. 14.
    Shen, X., Du, Z., Chen, R.: Research on NTRU algorithm for mobile Java security. In: 2009 International Conference on Scalable Computing and Communications; Eighth International Conference on Embedded Computing, pp. 366–369, September 2009Google Scholar
  15. 15.
    Stallings, W.: Cryptography and Network Security: Principles and Practice, 6th edn. Prentice Hall Press, Upper Saddle River (2013)Google Scholar
  16. 16.
    Zemao, C., Junge, Z., Biyi, H.: Optimizing PKI for 3GPP authentication and key agreement. In: 2012 Fourth International Conference on Multimedia Information Networking and Security (MINES), pp. 79–82. IEEE (2012)Google Scholar
  17. 17.
    Zhao, X., Wenyan, Z., Shanshan, C.: New certificate status verification scheme based on OCSP for wireless environment. In: 2009 International Forum on Computer Science-Technology and Applications, vol. 2, pp. 195–198, December 2009Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Krishna Prakasha
    • 1
  • Pratheeksha Gowda
    • 1
  • Vasundhara Acharya
    • 2
    Email author
  • Balachandra Muniyal
    • 1
  • Mayank Khandelwal
    • 3
  1. 1.Department of Information and Communication TechnologyManipal Institute of Technology, MAHEManipalIndia
  2. 2.Department of Computer Science and EngineeringManipal Institute of Technology, MAHEManipalIndia
  3. 3.Aalto UniversityEspooFinland

Personalised recommendations