Abstract
Mobile Ad hoc Network (MANET) is a matter of great concern and an emerging research field of ubiquitous computing. Nowadays, security issues regarding MANETs are gaining remarkable research interest. MANET is more vulnerable to the security attacks by resource constraints. An ID based cryptography allows an user to generate their public keys without exchanging any certificates. In above scheme, public/private key can be construct without exchanging any certificate. The idea of bilinear pairings make the system efficient and easy to providing basic security. In order to provide secure communication in MANET, many researchers used different schemes to provide authentication. However, existing techniques have drawbacks such as forgery on adaptive chosen plain text message and back secrecy in traditional authentication schemes. In this paper, we work on an ID based signature scheme for achieving reliability and secure authentication in MANET. We show that proposed id based signature scheme is secure against forgery attack in the random oracle model under the Inverse-Computational Diffie-Hellman Problem (Inv-CDHP) assumption. Proposed scheme is more efficient in term of computation than other traditional schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Hu, Y.-C., Perrig, A.: A survey of secure wireless ad hoc routing. In: Proceedings of IEEE Security and Privacy, pp. 28–39. IEEE Press (2004)
Burmeste, M., de Medeiros, B.: On the security of route discovery in MANETs. In: Proceedings of IEEE Transactions on mobile computing, vol. 8, pp. 1180–1187. IEEE Press (2009)
Argyroudis, P.G., Mahony, D.O.: Secure routing for mobile ad hoc networks. In: Proceedings of IEEE Communications Surveys and Tutorials, Third Quarter, vol. 7, pp. 2–21. IEEE Press (2005)
Tian, B., Han, S., Hu, J., Dillon, T.: A mutual-healing key distribution scheme in wireless sensor networks. J. Netw. Comput. Appl. 34, 80–88 (2011). Elsevier
Tian, B., Han, S., Parvin, S., Hu, J., Das, S.: Self-healing key distribution schemes for wireless networks: a Survey. Comput. J. 54(4), 549–569 (2011). Oxford
Konate, K., Gaye, A.: attacks analysis in mobile ad hoc networks: modeling and simulation. In: Proceedings of IEEE International Conference on Intelligent Systems, Modeling and Simulation, pp. 367–372. IEEE Press (2011)
Zhang, Y., Lee, W.: Security in mobile ad-hoc networks. In: Mohapatra, P., Krishnamurthy, S.V. (eds.) Book Ad hoc Networks Technologies and Protocols, pp. 249–268. Springer, Heidelberg (2005)
Westhoff, D., Lamparter, B., Paar, C., Weimerskirch, A.: On digital signature in ad hoc network. Trans. Emerg. Telecommun. Technol. 16, 411–425 (2005)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Zhang, F., Safavi-Naini, R., Susilo, W.: An efficient signature scheme from bilinear pairings and its applications. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 277–290. Springer, Heidelberg (2004)
Hu, Y.C., Perrig, A., Johnson, D.B.: Aridane: a secure on-demand routing protocol for ad hoc networks. In: Proceedings of International Conference on Mobile Computing and Networking (MobiCom 2002), pp. 12–23. ACM Press (2002)
Sanzgiri, K. et al. : A secure routing protocol for ad hoc networks. In: Proceedings of IEEE International Conference (INCP-02), pp. 78–87. IEEE Press (2002)
Zapata, M.G., Asokan, N.: Securing ad hoc routing protocols. In: Proceedings ACM Workshop on Wireless Security (WiSe), pp. 1–10. ACM Press (2002)
Wang, H., Zhang, Y.: Identity-based strong key-insulated ring signature scheme in the standard model. In: Seventh International Conference Mobile Ad-hoc Sensor Networks, pp. 451–455 (2011)
Mishra, S., Sahu, R.A., Padhye, S., Yadav, R.S.: An ID-based signature scheme from bilinear pairing based on k-plus problem. In: Proceedings of 3rd International Conference on Electronics Computer Technology (ICECT- 2011), Kanyakumari, India. IEEE, pp. 104–107 (2011)
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)
Acknowledgements
This research work is partially funded by the Technical Quality Improvement Programme Phase II (TEQIP-II).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Kumar, V., Kumar, R. (2015). An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-Martínez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-22915-7_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22914-0
Online ISBN: 978-3-319-22915-7
eBook Packages: Computer ScienceComputer Science (R0)