Abstract
The mobile ad hoc network (MANET) is a collection of wireless mobile nodes that communicate with one another through a standard transmission medium such as Wi-Fi, cellular, or satellite communication. However, their basic characteristics make them vulnerable against numerous attacks accordingly raising the need of security. In this paper, we propose a certificateless signcryption scheme based on the difficulty of solving the Diffie–Hellman problem. The simulation result proves that the scheme is secure against active and passive attacks using AVISPA (Automated Validation of Internet Security Protocols and Applications) tool.
References
I. Chlamtac, M. Conti, J.J.N. Liu, Mobile ad hoc networking: imperatives and challenges. Ad Hoc Netw. 1(1), 13–64 (2003)
P.M. Jawandhiya et al., A survey of mobile ad hoc network attacks. Int. J. Eng. Sci. Technol. 2.9, 4063–4071 (2010)
A. Shamir, Identity-based cryptosystems and signature schemes, in Advances in cryptology (Springer, Berlin Heidelberg, 1985)
Y. Zhang et al., Securing mobile ad hoc networks with certificateless public keys. Dependable Secure Comput. IEEE Trans. 3(4), 386–399 (2006)
Z. Zhang, W. Susilo, R. Raad, Mobile ad-hoc network key management with certificateless cryptography, in 2nd International Conference on Signal Processing and Communication Systems, 2008. ICSPCS 2008 (IEEE, 2008)
X. Boyen, Multipurpose identity-based signcryption, in Advances in Cryptology-CRYPTO 2003 (Springer, Berlin Heidelberg, 2003), pp. 383–399
L. Chen, J. Malone-Lee, Improved identity-based signcryption, in Public Key Cryptography-PKC 2005 (Springer, Berlin Heidelberg, 2005), pp. 362–379
S.S. Al-Riyami, K.G. Paterson, Certificateless public key cryptography, in Advances in Cryptology-ASIACRYPT 2003 (Springer, Berlin Heidelberg, 2003), pp. 452–473
Y. Zheng, Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption), in Advances in Cryptology—CRYPTO’97 (Springer, Berlin Heidelberg, 1997), pp. 165–179
X. Lv, H. Li, B. Wang, Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks. Secur. Commun. Netw. 6(1), 49–57 (2013)
M. Barbosa, P. Farshim, Certificateless signcryption, in Proceedings of the 2008 ACM symposium on Information, computer and communications security (ACM, 2008)
W.-H. Liu, C.-X. Xu, Certificateless signcryption scheme without bilinear pairing. Ruanjian Xuebao J. Softw. 22(8), 1918–1926 (2011)
W. Xie, Z. Zhang, Efficient and provably secure certificateless signcryption from bilinear maps, in IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), 2010 (IEEE, 2010)
D-B. He, Security analysis of a certificateless signcryption scheme. Ruanjian Xuebao J. Softw. 24(3), 618–622 (2013)
W. Shi et al., Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing. Front. Comput. Sci. 8(4), 656–666 (2014)
B. Wang, J. Li, (t, n) Threshold signature scheme without a trusted party. Chin. J. Comput. 26(11), 1581–1584 (2003). (Chinese Edition)
L.-C. Li, R.-S. Liu, Securing cluster-based ad hoc networks with distributed authorities. Wirel. Commun. IEEE Trans. 9(10), 3072–3081 (2010)
H. Lee et al., ID-based key management scheme using threshold decryption for OPMD environment, in IEEE International Conference on Consumer Electronics (ICCE), 2012 (IEEE, 2012)
F. Miao et al., Fully self-Organized Key management scheme in MANET and its applications, in Computer Networks & Communications (NetCom) (Springer, New York, 2013), pp. 381–391
AVISPA, Automated validation of internet security protocols and applications. http://www.avispa-project.org/. Accessed on Sept 2015
L. Vigan, Automated security protocol analysis with the AVISPA tool. Electron. Notes Theor. Comput. Sci. 155, 61–86 (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mandal, S., Mohanty, S., Majhi, B. (2018). Universally Verifiable Certificateless Signcryption Scheme for MANET. In: Nath, V. (eds) Proceedings of the International Conference on Microelectronics, Computing & Communication Systems. Lecture Notes in Electrical Engineering, vol 453. Springer, Singapore. https://doi.org/10.1007/978-981-10-5565-2_7
Download citation
DOI: https://doi.org/10.1007/978-981-10-5565-2_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5564-5
Online ISBN: 978-981-10-5565-2
eBook Packages: EngineeringEngineering (R0)