Secure device-to-device authentication in mobile multi-hop networks

Hyunsoo Kwon, Changhee Hahn, Daeyoung Kim, Kyungtae Kang, Junbeom Hur

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

Abstract

In order to deal with drastically increasing mobile traffic these days, device to device connection (D2D) which provides infra-connection’s off-loading is getting a lot of attention. However, we observed that most of the currentD2Dprotocols such as Bluetooth and Wi-FiDirect are not scalable, and vulnerable to main-in-the-middle (MITM) and replay attacks in mobile multi-hop networks. In this paper, we propose novel D2D authentication protocols with a secure initial key establishment using ciphertextpolicy attribute-based encryption(CP-ABE) to solve this problem. By exploiting CP-ABE, the proposed scheme allows the communicating parties to mutually authenticate each other and derive the link key in an expressive and secure way in themulti-hop network environment. According to the analysis results, the proposed scheme is secure against MITM and replay attacks in the D2D mobile multi-hop networks.

Original languageEnglish
Title of host publicationWireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings
EditorsSiyao Cheng, Hongzhi Wang, Hong Gao, Chaokun Wang, Zhipeng Cai
PublisherSpringer Verlag
Pages267-278
Number of pages12
ISBN (Electronic)9783319077819
Publication statusPublished - 2014 Jan 1
Externally publishedYes
Event9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014 - Harbin, China
Duration: 2014 Jun 232014 Jun 25

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8491
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014
CountryChina
CityHarbin
Period14/6/2314/6/25

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Secure device-to-device authentication in mobile multi-hop networks'. Together they form a unique fingerprint.

  • Cite this

    Kwon, H., Hahn, C., Kim, D., Kang, K., & Hur, J. (2014). Secure device-to-device authentication in mobile multi-hop networks. In S. Cheng, H. Wang, H. Gao, C. Wang, & Z. Cai (Eds.), Wireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings (pp. 267-278). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 8491). Springer Verlag.