Secure device-to-device authentication in mobile multi-hop networks
- Authors
- Kwon, Hyunsoo; Hahn, Changhee; Kim, Daeyoung; Kang, Kyungtae; Hur, Junbeom
- Issue Date
- Jun-2014
- Publisher
- Springer Verlag
- Keywords
- Secure devices; Key establishments; Network environments; Loading; Authentication; Mobile traffic; Device authentications; Multihop networks; Ciphertext-policy attribute-based encryptions; Cryptography; Authentication protocols
- Citation
- Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v.8491, pp 267 - 278
- Pages
- 12
- Indexed
- OTHER
- Journal Title
- Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
- Volume
- 8491
- Start Page
- 267
- End Page
- 278
- URI
- https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/25500
- DOI
- 10.1007/978-3-319-07782-6_25
- ISSN
- 0302-9743
- Abstract
- In order to deal with drastically increasing mobile traffic these days, device to device connection (D2D) which provides infra-connection’s off-loading is getting a lot of attention. However, we observed that most of the currentD2Dprotocols such as Bluetooth and Wi-FiDirect are not scalable, and vulnerable to main-in-the-middle (MITM) and replay attacks in mobile multi-hop networks. In this paper, we propose novel D2D authentication protocols with a secure initial key establishment using ciphertextpolicy attribute-based encryption(CP-ABE) to solve this problem. By exploiting CP-ABE, the proposed scheme allows the communicating parties to mutually authenticate each other and derive the link key in an expressive and secure way in themulti-hop network environment. According to the analysis results, the proposed scheme is secure against MITM and replay attacks in the D2D mobile multi-hop networks. © Springer International Publishing Switzerland 2014.
- Files in This Item
-
Go to Link
- Appears in
Collections - COLLEGE OF COMPUTING > DEPARTMENT OF ARTIFICIAL INTELLIGENCE > 1. Journal Articles

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.