CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Secure Zero Knowledge Authentication Protocol for Wireless (Mobile) Ad-Hoc Networks

by Atul Chaturvedi, Neelam Srivastava, Varun Shukla, S.P. Tripathi, Manoj Kumar Misra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 128 - Number 2
Year of Publication: 2015
Authors: Atul Chaturvedi, Neelam Srivastava, Varun Shukla, S.P. Tripathi, Manoj Kumar Misra
10.5120/ijca2015906437

Atul Chaturvedi, Neelam Srivastava, Varun Shukla, S.P. Tripathi, Manoj Kumar Misra . A Secure Zero Knowledge Authentication Protocol for Wireless (Mobile) Ad-Hoc Networks. International Journal of Computer Applications. 128, 2 ( October 2015), 36-39. DOI=10.5120/ijca2015906437

@article{ 10.5120/ijca2015906437,
author = { Atul Chaturvedi, Neelam Srivastava, Varun Shukla, S.P. Tripathi, Manoj Kumar Misra },
title = { A Secure Zero Knowledge Authentication Protocol for Wireless (Mobile) Ad-Hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 128 },
number = { 2 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 36-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume128/number2/22846-2015906437/ },
doi = { 10.5120/ijca2015906437 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:22:07.150722+05:30
%A Atul Chaturvedi
%A Neelam Srivastava
%A Varun Shukla
%A S.P. Tripathi
%A Manoj Kumar Misra
%T A Secure Zero Knowledge Authentication Protocol for Wireless (Mobile) Ad-Hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 128
%N 2
%P 36-39
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Entity authentication and key distribution are very important cryptographic problems in mobile communication or in ad-hoc networks or in wireless communication at large. Mutual entity authentication is seen as the necessary process to the establishment of a secure and authentic connection. For a reliable secure communication, mutual entity authentication is very often seen as the necessity to the establishment of a secure connection. Authentication is necessary in wireless communication such as GSM or for Ad-Hoc purposes [26].Here Latin word ad-hoc means for the specific purpose only. Authentication is also necessary in situations where we need more than two entities in the authentication exchange such as a mobile user, a local AAA (Authentication, Authorization and Accounting) server and a remote (home) AAA server [8,21]. In such situations it is essential to include authentic and secure key exchange mechanism that ensures enhancement of trust in communication. This paper provides an authenticated zero knowledge protocol which is very helpful in establishing secure wireless communication in ad-hoc networks by satisfying cryptographic goals such as authentication, data integrity etc [13].

References
  1. D. Balfanz, D. K. Smetters, P. Stewart, H. Chi. Wong,“Talking to Strangers: Authentication in Ad-Hoc Wireless Networks.” In Symposium on Network and Distributed Systems Security (NDSS '02), San Diego, CA,2002.
  2. S. Basagni , K. Herrin,E.Rosti, D.Bruschi “Secure pebblenets.” In Proc. Of the 2nd ACM international symposium on Mobile ad hoc networking & computing, 2001.
  3. M. Bechler, H.J.Hof, D. Kraft, E. Phalke, L. Wolf “A Cluster-Based Security Architecture for Ad Hoc Networks” INFOCOM 2004.
  4. J. Binder, H.P. Bischof, “Zero knowledge proofs of identity for ad hoc wireless networks.” 2003.
  5. H. Deng, A. Mukherjee, D. P. Agrawal, “Threshold and Identity-Based Key Management and Authentication for Wireless Ad Hoc Networks.” International Conference on Information Technology: Coding and Computing (ITCC'04), volume 1, pp 124-128.
  6. W.Diffie, & M.Hellman, New directions in cryptography, IEEE Trans. Inform. Theory,22(6),1976,644-654.
  7. W. Du, R.Wang, P. Ning, “An Efficient Scheme for Authenticating Public Keys in Sensor Networks.” In Proc. of 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2005.a
  8. A. Fritz , J.F. Paris, “Maille Authentication: A Novel Protocol for Distributed Authentication.” In Proc. of the 19th IFIP Information Security Conference (SEC 2004), Toulouse, France, Aug. 2004, pp 309–322.
  9. S. Gokhale, P. Dasgupta, “Distributed Authentication for Peer-to-Peer Networks”, In Symposium on Applications and the Internet Workshops 2003 (SAINT'03 Workshops).
  10. S. Hahm, Y. Jung, S. Yi, Y. Song, I. Chong, , K. Lim, “A Self-organized Authentication Architecture in Mobile Ad-hoc Networks.” International Conference on Information Networking (ICOIN) 2005.
  11. IEEE Std 802.11a-1999 Supplement to IEEE standard for information technology telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements. Part 11: wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: high-speed physical layer in the 5 GHz band.
  12. H. Luo, P. Zerfos, J. Kong, S. Lu, , L. Zhang, “Self- Securing Ad Hoc Wireless Networks.” In Seventh IEEE Symposium on Computers and Communications (ISCC '02), 2002.
  13. A.J. Menezes, P.C.V. Oorschot,, S.A.Vanstone, Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
  14. C.J. Mitchell, : Making serial number based authentication robust against loss of state. ACM SIGOPS Operating Systems Review, Volume 34, Issue 3, July 2000,pp 56–59.
  15. C.J. Mitchell, : The security of the GSM air interface protocol. Technical Report RHUL-MA-2001-3, Mathematics Department, Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK (2001) Available at http://www.ma.rhul.ac.uk/techreports.
  16. E. C. H. Ngai, M. R. Lyu, “Trust- and Clustering based Authentication Services in Mobile Ad Hoc Networks.” In Proc. of 24th International Conference on Distributed Computing Systems Workshops - W4: MDC (ICDCSW'04).
  17. E. C. H. Ngai , M. R. Lyu , R. T. Chin, “An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks.” In Proc. of 2004 IEEE Aerospace Conference, March 6-13 2004.
  18. D. Park, C. Boyd, E. Dawson. “Classification of Authentication Protocols: A Practical Approach.” Proceedings of the Third International Workshop on Information Security.
  19. A. Perrig, R. Canetti, J. Tygar, D. Song, “Efficient authentication and signing of multicast streams over lossy channels.” In Proc. of IEEE Symposium on Security and Privacy, May 2000.
  20. A Perrig, R. Szewczyk, V. Wen, D. Culler, J.D. Tygar, “SPINS: Security Protocols for Sensor Networks.” In Proc. Of ACM Mobicom'01, Rome, ACM Press 2001, pp 189-199.
  21. A. Pirzada, C. McDonald, “Kerberos Assisted Authentication in Mobile Ad hoc Networks.” Proceedings of the 27th conference on Australasian computer science.
  22. F. Stajano , R. Anderson, “The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks.” In M. Roe B. Christianson, B. Crispo, editor, Security Protocols, 7th International Workshop Proceedings, LectureNotes in Computer Science. Springer Verlag, 1999.
  23. R.J.Sutton : Secure communications: Applications and management. John Wiley & Sons (2002).
  24. M. Tamer Refaei, V. Srivastava, L. DaSilva, M. Eltoweissy “A Reputation-based mechanism for Isolating Selfish Nodes in Ad Hoc networks”. In Proc. of the IEEE Mobiquitous 2005, San Diego, CA.
  25. L. Venkatraman, D.P. Agrawal, “A Novel Authentication Scheme for Ad Hoc Networks.” In IEEE Wireless Communications and Networking Conference (WCNC 2000), vol. 3, pp 1268 -1273, 2000.
  26. M.Walker, T.Wright,: Security. In F.Hillebrand, editor.: GSM and UMTS: The creation of global mobile communication. John Wiley & Sons (2002) pp 385–406.
  27. A. Weimerskirch ,G. Thonet, “A Distributed Light-Weight Authentication Model for Ad-hoc Networks.” In Proc. of 4th International Conference on Information Security and Cryptology (ICISC 2001), 6-7 December 2001.
  28. A. Weirmerskirch , D. Westhoff, “Identity Certified Authentication for Ad-hoc Networks.” In Proc. of the 1st ACM workshop on Security of ad hoc and sensor networks, 2003, VA USA.
  29. R. Yahalom, B. Klein, T. Beth, “Trust Relationships in Secure Systems- A Distributed Authentication Perspective.” In Proc. of the 1993 IEEE Symposium on Security and Privacy, CA USA.
  30. L. Zhou ,Z.J. Haas, “Securing Ad Hoc Networks.” IEEE Network Journal, vol. 13, no. 6,1999, pp. 24-30.
  31. S. Zhu, S. Setia and S. Jajodia, “LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks.” In 10th ACM Conference on Computer and Communications Security (CCS '03).
  32. S. Zhu, S. Xu, S. Setia and S. Jajodia, “LHAP: A lightweight hop-by-hop authentication protocol for ad-hoc networks.” In Proc. of ICDCS 2003 International Workshop on Mobile and Wireless Network (MWN 2003), May 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Wireless Communication Ad-Hoc Networks Secure Communication Zero Knowledge (ZK) Protocol