Secure device-to-device authentication in mobile multi-hop networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kwon, Hyunsoo | - |
dc.contributor.author | Hahn, Changhee | - |
dc.contributor.author | Kim, Daeyoung | - |
dc.contributor.author | Kang, Kyungtae | - |
dc.contributor.author | Hur, Junbeom | - |
dc.date.accessioned | 2021-06-23T01:25:21Z | - |
dc.date.available | 2021-06-23T01:25:21Z | - |
dc.date.issued | 2014-06 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/25500 | - |
dc.description.abstract | In order to deal with drastically increasing mobile traffic these days, device to device connection (D2D) which provides infra-connection’s off-loading is getting a lot of attention. However, we observed that most of the currentD2Dprotocols such as Bluetooth and Wi-FiDirect are not scalable, and vulnerable to main-in-the-middle (MITM) and replay attacks in mobile multi-hop networks. In this paper, we propose novel D2D authentication protocols with a secure initial key establishment using ciphertextpolicy attribute-based encryption(CP-ABE) to solve this problem. By exploiting CP-ABE, the proposed scheme allows the communicating parties to mutually authenticate each other and derive the link key in an expressive and secure way in themulti-hop network environment. According to the analysis results, the proposed scheme is secure against MITM and replay attacks in the D2D mobile multi-hop networks. © Springer International Publishing Switzerland 2014. | - |
dc.format.extent | 12 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Springer Verlag | - |
dc.title | Secure device-to-device authentication in mobile multi-hop networks | - |
dc.type | Article | - |
dc.publisher.location | 독일 | - |
dc.identifier.doi | 10.1007/978-3-319-07782-6_25 | - |
dc.identifier.scopusid | 2-s2.0-84919384470 | - |
dc.identifier.wosid | 000345072900025 | - |
dc.identifier.bibliographicCitation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v.8491, pp 267 - 278 | - |
dc.citation.title | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.citation.volume | 8491 | - |
dc.citation.startPage | 267 | - |
dc.citation.endPage | 278 | - |
dc.type.docType | Conference Paper | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | other | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architectur | - |
dc.relation.journalWebOfScienceCategory | eComputer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | Authentication | - |
dc.subject.keywordPlus | Cryptography | - |
dc.subject.keywordPlus | Authentication protocols | - |
dc.subject.keywordPlus | Ciphertext-policy attribute-based encryptions | - |
dc.subject.keywordPlus | Device authentications | - |
dc.subject.keywordPlus | Key establishments | - |
dc.subject.keywordPlus | Mobile traffic | - |
dc.subject.keywordPlus | Multihop networks | - |
dc.subject.keywordPlus | Network environments | - |
dc.subject.keywordPlus | Secure devices | - |
dc.subject.keywordPlus | Network security | - |
dc.subject.keywordAuthor | Secure devices | - |
dc.subject.keywordAuthor | Key establishments | - |
dc.subject.keywordAuthor | Network environments | - |
dc.subject.keywordAuthor | Loading | - |
dc.subject.keywordAuthor | Authentication | - |
dc.subject.keywordAuthor | Mobile traffic | - |
dc.subject.keywordAuthor | Device authentications | - |
dc.subject.keywordAuthor | Multihop networks | - |
dc.subject.keywordAuthor | Ciphertext-policy attribute-based encryptions | - |
dc.subject.keywordAuthor | Cryptography | - |
dc.subject.keywordAuthor | Authentication protocols | - |
dc.identifier.url | https://link.springer.com/chapter/10.1007/978-3-319-07782-6_25 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.