Abstract
The lack of infrastructure and central authority (CA) makes MANET security a very challenging mission. Fast and lightweight security solutions are required because of the mobility feature and resources limitation of such network. Most recent work uses the identity-based encryption as a basic solution for MANET security. However, the continuing usage of the bilinear pairing operations is costly and not suitable for such environment. In this paper, we present DIDRSA, a new decentralized identity-based RSA authentication scheme for MANET. The number of bilinear pairing operations is reduced to (1 + t) operations. The public keys are secured to provide a safe method for using RSA cryptography speeding techniques. We prove that our scheme is secure against RSA attacks involved when using such speeding techniques. The scheme performance has been tested using simulation scenarios under different routing protocols. We also highlight the usage of this scheme for AODV routing protocol security as a future work.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
Guarnera, M.; Villari, M.; Zaia, A.; Puliafito, A.: Manet: Possible applications with pda in wireless imaging environment. In: 13th IEEE international symposium on personal, indoor and mobile radio communications, pp 2394–2398 (2002)
Zhou L., Haas Z.: Securing ad hoc networks. Netw. IEEE. 13(6), 24–30 (1999)
Kong, J.; Zerfos, P.; Luo, H.; Lu, S.; Zhang, L.: Providing robust and ubiquitous security support for mobile ad-hoc networks. In: International conference on network protocols, Department of Computer Science, California University, Los Angeles, pp. 251–260 (2001)
Capkun S., Buttyan L., Hubaux J.-P.: Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mobile Comput. 2(1), 52–64 (2003)
Yi, S.; Kravets, R.: Moca: mobile certificate authority for wireless ad hoc networks. In: 2nd Annual PKI Research Workshop Program (PKI 03), pp. 65–79 (2003)
Zhou, L.; Schneider, F.; Van Renesse, R.: Coca: a secure distributed online certification authority. In: Foundations of Intrusion Tolerant Systems, 2003 (Organically Assured and Survivable Information Systems), pp. 152–191 (2003)
Levent E., Chavan N.J.: Elliptic curve cryptography based threshold cryptography (ecc-tc) implementation for manets. IJCSNS Int. J. Comput. Sci. Netw. Secur. 7(4), 48–61 (2007)
Bechler, M.; Hof, H.-J.; Kraft, D.; Pahlke, F.; Wolf, L.: A cluster-based security architecture for ad hoc networks, INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 4, pp. 2393–2403, March 2004
Hadjichristofi, G.C.; Adams, W.J.; Davis, N.J., IV.: A framework for key management in mobile ad hoc networks. In: International Conference on Information Technology: Coding and Computing, ITCC, vol. 2, pp. 568–573. New York 10016-5997 (2005)
Weimerskirch, A.; Thonet, G.: A distributed light-weight authentication model for ad-hoc networks. In: The 4th International Conference on Information Security and Cryptology (ICISC 2001), pp. 341–354. London, Springer (2001)
Marias G.F., Papapanagiotou K., Tsetsos V., Sekkas O., Georgiadis P.: Integrating a trust framework with a distributed certificate validation scheme for manets. EURASIP J. Wirel. Commun. Netw. 2006(2), 77–77 (2006)
Wang, G.; Wang, Q.; Cao, J.; Guo, M.: An effective trust establishment scheme for authentication in mobile ad-hoc networks. In: CIT 2007, 7th IEEE International Conference on Computer and Information Technology, pp. 749–754. Piscataway (2007)
Datta, A.; Quarteroni, S.; Aberer, K.: Autonomous gossiping: a self organizing epidemic algorithm for selective information dissemination in wireless mobile Ad-Hoc networks. In: ICSNW (2004)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO 84 on Advances in cryptology, pp. 47–53. Springer, Inc., New York (1985)
Eissa, T.; Razak, S.; Ngadi, M.: Authentication techniques in manet. In: Student Conference on Research and Development (SCOReD 2008), pp. 130–134. March 2008
Deng, H.; Mukherjee, A.; Agrawal, D.P.: Threshold and identity-based key management and authentication for wireless ad hoc networks. In: International Conference on Information Technology: Coding Computing, ITCC, vol. 1, pp. 107–111. Piscataway (2004)
Boneh D., Franklin M.: Identity-based encryption from the weil pairing. SIAM J. Comput. 32(3), 586–615 (2003)
Baek, J.; Zheng, Y.: Identity-based threshold decryption. In: Proceedings of PKC04, LNCS 2947, pp. 262–276. Springer, London (2004)
Kiltz E., Galindo D.: Direct chosen-ciphertext secure identity-based key encapsulation without random oracles. Theor. Comput. Sci. 410(47–49), 5093–5111 (2009)
Daza V., Herranz J., Morillo P., Rifols C.: Cryptographic techniques for mobile ad-hoc networks. Comput. Networks. 51(18), 4938–4950 (2007)
Eissa, T.; Razak, S.; Ngadi, M.: Enhancing manet security using secret public keys. In: 2009 International Conference on Future Networks, pp. 130–134. March 2009
Barreto, P.S.L.M.; Kim, H.Y.; Lynn, B.; Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: CRYPTO ’02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology, pp. 354–368. London, Springer (2002)
Thomas, C.E.L.R.L.R.; Cormen, H.; Stein, C.: Introduction to Algorithms, vol. second edn. MIT Press and McGraw-Hill (2001)
Galbraith S.D., Paterson K.G., Smart N.P.: Pairings for cryptographers. Discret. Appl. Math. 156(16), 3113–3121 (2008)
Menezes, A.J.; Vanstone, S.A.; Oorschot, P.C.V.: Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton (1996)
Boneh D.: Twenty years of attacks on the rsa cryptosystem. Notices AMS. 46, 203–213 (1999)
Wiener M.: Cryptanalysis of short rsa secret exponents. IEEE Trans. Inf. Theory 36(3), 553–558 (1990)
Boneh, D.; Durfee, G.: Cryptanalysis of rsa with private key d less than n 0.292. IEEE Trans. Inf. Theory. 46(4), 1339–1349 (2000)
May, A.: Cryptanalysis of unbalanced rsa with small crt-exponent. In: CRYPTO’02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology, pp. 242–256. Springer, London (2002)
Kocher, P.C.: Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: CRYPTO ’96: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, pp. 104–113. Springer, London (1996)
Lenstra, A.K.; Lenstra, H.W. Jr.: Algorithms in number theory, pp. 673–715 (1990)
Boneh, Y.F.D.; Durfee, G.: An attack on rsa given a fraction of the private key bits. In: Advances in Cryptology, Asiacrypt98, LNCS, vol. 1514, pp. 25–34 (1998)
Antonov, P.; Antonova, V.: Development of the attack against rsa with low public exponent and related messages. In: CompSysTech ’07 Proceedings of the 2007 international conference on computer systems and technologies, pp. 1–8. ACM, New York (2007)
Hastad J.: Solving simultaneous modular equations of low degree. SIAM J. Comput. Arch. 17(2), 336–341 (1988)
Coppersmith, D.; Franklin, M.; Patarin, J.; Reiter, M.: Low-exponent rsa with related messages, pp. 1–9. Springer, Berlin (1996)
Coppersmith D.: Small solutions to polynomial equations, and low exponent rsa vulnerabilities. J. Cryptol. 10(4), 233–260 (1997)
Pomerance, C.: The quadratic sieve factoring algorithm. In: Proceedings of the EURO-CRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques, pp. 169–182. Springer, Inc., New York (1985)
Gordon D.M.: Discrete logarithms in gf(p) using the number field sieve. SIAM J. Discret. Math. 6(1), 124–138 (1993)
Montgomery, P.L.: Modular multiplication without trial division. Am. Math. Soc. 44(170) (1985)
Zhou Z., Huang D.: Computing cryptographic pairing in sensors. SIGBED Rev. 5(1), 1–2 (2008)
Barr, R.: Jist java in simulation time user guide (2004). http://www.isi.edu/nsnam/ns/
Rodrigopitanga, z.: Geovandro. Pereira, secure-sms (2008). http://code.google.com/p/secure-sms/
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Eissa, T., Razak, S.A. & Ngadi, M.A. A Novel Lightweight Authentication Scheme for Mobile Ad Hoc Networks. Arab J Sci Eng 37, 2179–2192 (2012). https://doi.org/10.1007/s13369-012-0318-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13369-012-0318-y