TY - GEN
T1 - Secure device-to-device authentication in mobile multi-hop networks
AU - Kwon, Hyunsoo
AU - Hahn, Changhee
AU - Kim, Daeyoung
AU - Kang, Kyungtae
AU - Hur, Junbeom
PY - 2014
Y1 - 2014
N2 - In order to deal with drastically increasing mobile traffic these days, device to device connection (D2D) which provides infra-connection’s off-loading is getting a lot of attention. However, we observed that most of the currentD2Dprotocols such as Bluetooth and Wi-FiDirect are not scalable, and vulnerable to main-in-the-middle (MITM) and replay attacks in mobile multi-hop networks. In this paper, we propose novel D2D authentication protocols with a secure initial key establishment using ciphertextpolicy attribute-based encryption(CP-ABE) to solve this problem. By exploiting CP-ABE, the proposed scheme allows the communicating parties to mutually authenticate each other and derive the link key in an expressive and secure way in themulti-hop network environment. According to the analysis results, the proposed scheme is secure against MITM and replay attacks in the D2D mobile multi-hop networks.
AB - In order to deal with drastically increasing mobile traffic these days, device to device connection (D2D) which provides infra-connection’s off-loading is getting a lot of attention. However, we observed that most of the currentD2Dprotocols such as Bluetooth and Wi-FiDirect are not scalable, and vulnerable to main-in-the-middle (MITM) and replay attacks in mobile multi-hop networks. In this paper, we propose novel D2D authentication protocols with a secure initial key establishment using ciphertextpolicy attribute-based encryption(CP-ABE) to solve this problem. By exploiting CP-ABE, the proposed scheme allows the communicating parties to mutually authenticate each other and derive the link key in an expressive and secure way in themulti-hop network environment. According to the analysis results, the proposed scheme is secure against MITM and replay attacks in the D2D mobile multi-hop networks.
UR - http://www.scopus.com/inward/record.url?scp=84919384470&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84919384470&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-07782-6_25
DO - 10.1007/978-3-319-07782-6_25
M3 - Conference contribution
AN - SCOPUS:84919384470
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 267
EP - 278
BT - Wireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings
A2 - Cai, Zhipeng
A2 - Wang, Chaokun
A2 - Cheng, Siyao
A2 - Wang, Hongzhi
A2 - Gao, Hong
PB - Springer Verlag
T2 - 9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014
Y2 - 23 June 2014 through 25 June 2014
ER -