Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks

Hyunsoo Kwon, Daeyeong Kim, Changhee Hahn, Junbeom Hur

Research output: Contribution to journalArticle

11 Citations (Scopus)

Abstract

With the dramatic increase of the number of mobile devices such as smartphones and tablet PCs, mobile traffic has increased enormously. Especially, the multimedia data accounts for bulk of the traffic transmitted in mobile networks. To accommodate this growth, device-to-device connection (D2D), which provides infra-connection off-loading, is receiving significant attention. However, we have observed that the majority of the current D2D protocols including Bluetooth and Wi-Fi Direct are vulnerable to man-in-the-middle (MITM) and replay attacks in mobile multi-hop networks. To resolve this problem, in this paper, we propose a novel D2D authentication protocol with a secure initial key establishment using ciphertext-policy attribute-based encryption (CP-ABE). By leveraging CP-ABE, the proposed scheme allows the communicating parties to mutually authenticate and derive the link key in an expressive and secure manner in a multi-hop network environment. We also propose several variations of the proposed scheme for different scenarios in a multi-hop networks without network infrastructure. We prove that the proposed scheme is secure against MITM and replay attack in D2D mobile multi-hop networks. Experimental results indicate that the proposed scheme incurs reasonable computation cost in the real world.

Original languageEnglish
Pages (from-to)19507-19521
Number of pages15
JournalMultimedia Tools and Applications
Volume76
Issue number19
DOIs
Publication statusPublished - 2017 Oct 1

Keywords

  • Authentication
  • CP-ABE
  • D2D communication
  • Mobile multi-hop networks

ASJC Scopus subject areas

  • Software
  • Media Technology
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks'. Together they form a unique fingerprint.

  • Cite this