Multiple Server Indirect Security Authentication Protocol for Mobile Networks Using Elliptic Curve Cryptography (ECC)


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


More number of research works develops many authentication protocols and algorithms to provide a security in the mobile networks. But these existing protocols have the drawbacks in which a single and more than one server put in practice. These protocols suffer if the single server is compromised by the adversaries and in more than one server the protocols finds high complexity in design and integration of keys.  To address these issues in the existing works, in this paper a new complexity reduced protocol is proposed with multiple servers.  In this paper, we propose an indirect security protocol for mobile networks based on ECC scheme.  Initially, we generate keys to the multiple servers by the ECC scheme and these servers validate the each user node to provide the information. In mobile networks, it is essential to validate every node when it tries to request information from base station. After the key generation and the validation by the servers the information sharing process is accomplished between the user and the base station. In our security protocol is highly secure by generating cryptographic schemes distributed based on ECC and executed over multiple servers. The proposed indirect security protocol performance is analyzed by invoking more number of authenticated and adversary users and the result from this process guarantees the healthiness of the proposed security protocol. The implementation results show the effectiveness of proposed ECC based indirect security protocol in authenticating the users to access the information from the base station and the achieved improvement in security process. Moreover, the performance of the proposed indirect security protocol is evaluated by comparing with the existing indirect authentication security protocol in mobile networks.
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


Elliptic Curve Cryptography (ECC); Mobile Networks; Indirect Security Protocol; Authentication; Genetic Algorithm (GA); Tabu Search Algorithm (TSA)

Full Text:

PDF


References


Raffaele Bruno, Marco Conti, and Enrico Gregori, “Mesh Networks: Commodity Multihop Ad Hoc Networks”, IEEE Communications Magazine, pp. 123-131, March 2005

Nallamala Sri Hari, N. SrinivasRao, N. Satyanarayana, “A Novel Routing Attack In Mobile Ad Hoc Networks”, Indian Journal of Computer Science and Engineering, Vol. 1 No. 4, pp. 382-391, 2010.

Ping Yi, Zhoulin Dai, Shiyong Zhang, YipingZhong, “A New Routing Attack in Mobile Ad Hoc Networks”, International Journal of Information Technology, Vol. 11, No. 2, pp. 83-94, 2005.

Shu-Hwang Liaw, Pin-Chang Su, Henry Ker-Chang Chang, Erl-Huei Lu and Shun-Fu Pon, “Secured Key Exchange Protocol In Wireless Mobile Ad Hoc Networks”, International Carnahan Conference on Security Technology, pp. 171 - 173, 2005.

SrdjanCapkun, LeventeButtyan, Jean-Pierre Hubaux, “Self-Organized Public-Key Management for Mobile Ad Hoc Networks”, IEEE Transactions on Mobile Computing, Vol. 2, No. 1, pp. 52-64, January-March 2003

D. Jeyabharathi, D.Sasireka, D.Kesavaraja, “Implementation of Mobile Intrusion Detection Controller [MIDC] for Affording Secure Service in MANET Environment”, IJCA Special Issue on MANETs, Vol. 4, pp. 206-210, 2010.

Chou-Chan Yang, Kuan-Hao Chu, and Ya-Wen Yang, “3G and WLAN Interworking Security: Current Status and Key Issues”, International Journal of Network Security, Vol.2, No.1, PP .1-13, Jan. 2006

Anuj Joshi, PallaviSrivastava, and Poonam Singh, “Security Threats in Mobile Ad Hoc Network”, A Journal of Physical Sciences, Engineering and Technology, Vol. 1, No. 2, pp. 125-129, 2010.

Jing-ShyangHwu, Rong-JayeChen ; Yi-Bing Lin “Authenticated public-key distribution over WLAN/cellular dual networks”, 3rd International Conference on Information Technology: Research and Education, pp. 218-220, 2005.

LironNehmadi, Joachim Meyer, “A System for Studying Usability of Mobile Security”, 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, San Francisco, CA, USA, June 12, 2011.

Josette F. Jones, Sara A. Hook, Seong C. Park and LaSha M. Scott, “Privacy, Security and Interoperability of Mobile Health Applications”, Universal Access In Human-Computer Interaction. Context Diversity, Vol. 6767, pp. 46-55, 2011.

Theodore S. Rappaport, A. Annamalai, R. M. Buehrer, And William H. Tranter, “Wireless Communications: Past Events and A Future Perspective”, IEEE Communications Magazine, pp. 148-161, 2002.

Jing-ShyangHwu, Rong-Jaye Chen, and Yi-Bing Lin, “An Efficient Identity-based Cryptosystem for End-to-end Mobile Security”, IEEE Transactions on Wireless Communications, Vol. 5, No. 9, pp. 2586-2593, September 2006.

LepakshiGoud.T, “A Routing-Driven Public key Crypto system based key management scheme for a Sensor Network”, International Journal of Advanced Engineering Sciences and Technologies, Vol. 6, No. 2, pp. 246 – 255, 2011.

Jing-ShyangHwu, Shih-Feng Hsu, Yi-Bing Lin, Rong-Jaye Chen, “End-to-end security mechanisms for SMS”, International Journal of Security and Networks, Vol. 1, No. 3/4, pp. 177-183, 2006.

Rizwan Khan, A. K. Vatsa, “Detection and Control of DDOS Attacks over Reputation and Score Based MANET”, Journal of Emerging Trends in Computing and Information Sciences, Vol. 2, No. 11, October 2011

Hao Li, Jian Huang, Philip Sweany, Dijiang Huang “FPGA implementations of elliptic curve cryptography and Tate pairing over a binary field”, Journal of Systems Architecture, Vol. 54, No. 12, pp.1077–1088, December 2008.

E.S.Phalguna Krishna, I.D.Krishna Chandra, M.GaneshKarthik, “Packet Misrouting Attacks in Multi Radio Wireless Networks: Detection and Countermeasure”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, No. 4, pp. 396-401, April 2012.

Hao Yang, HaiyunLuo ; Fan Ye ; Songwu Lu ; Lixia Zhang, “Security in mobile ad hoc networks: challenges and solutions”, IEEE Wireless Communications, Vol. 11, No. 1, pp. 38- 47, 2004.

Rakesh Kumar Jha, Suresh V. Limkar, Upena D. Dalal, “A Performance Comparison of Routing Protocols (DSR and TORA) for Security Issue In MANET(Mobile Ad Hoc Networks)”, IJCA Special Issue on MANETs, Vol. 2, No. 5, pp. 78–83, 2010.

Felipe Téllez and Jorge Ortiz, “Behavior of Elliptic Curve Cryptosystems for the Wormhole Intrusion in MANET: A Survey and Analysis”, IJCSNS International Journal of Computer Science and Network Security, Vol.11 No.9, pp. 1-12, September 2011

Fengtong Wen, Xuelei Li, Shenjun Cui, “Cross-realm Client-to-client Password-based Authenticated Key Agreement Protocol for Mobile Deviceson Elliptic Curve Cryptosystem”, Journal of Convergence Information Technology, Vol. 6, No. 5, May 2011

Sameer Hasan Al-Bakri, M. L. Mat Kiah, A. A. Zaidan, B. B. Zaidan and GaziMahabubulAlam, “Securing peer-to-peer mobile communications using public key cryptography: New security strategy”, International Journal of the Physical Sciences Vol. 6, N. 4, pp. 930-938, 18 February, 2011

Sharad Kumar Verma and Dr. D.B. Ojha, “A Discussion on Elliptic Curve Cryptography and Its Applications”, International Journal of Computer Science Issues, Vol. 9, No. 1, pp. 74-77, January 2012

Kim, Do-Moon, “A Secure Routung Cryptography Algorithm in Mobile Ad Hoc Network”, International Journal of Computer Science and Network Security, Vol.12 No.7, pp. 121-128, July 2012.

P.G.Rajeswariand K. Thilagavathi, “An Efficient Authentication Protocol Based on Elliptic CurveCryptography for Mobile Networks”, International Journal of Computer Science and Network Security, Vol.9 No.2, p.p. February 2009

P.G. Rajeshwari and K. Thilgavathi, “A Novel Protocol for Indirect Authenticationin Mobile Networks based on Elliptic CurveCryptography”, Journal of Theoretical and Applied Information Technology, Vol. 6, No. 1, p.p. 56- 66, 2009

Khatib, M., Al-Haija, Q.A., Jaafar, A., Hardware architectures & designs for projective Elliptic curves point addition operation using variable levels of parallelism, (2011) International Review on Computers and Software (IRECOS), 6 (2), pp. 227-236.

Tang, H., Liu, X., Cryptanalysis of Yoon et al.'s user friendly authentication scheme with anonymity for wireless communications, (2012) International Review on Computers and Software (IRECOS), 7 (1), pp. 197-200.

Lu, C., Xiong, H., Liu, Z., An asymmetric encryption algorithm for wireless sensor networks based on elliptic curve cryptosystem, (2012) International Review on Computers and Software (IRECOS), 7 (5), pp. 2290-2297.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize