Skip to main content

Universally Verifiable Certificateless Signcryption Scheme for MANET

  • Conference paper
  • First Online:
Proceedings of the International Conference on Microelectronics, Computing & Communication Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 453))

Abstract

The mobile ad hoc network (MANET) is a collection of wireless mobile nodes that communicate with one another through a standard transmission medium such as Wi-Fi, cellular, or satellite communication. However, their basic characteristics make them vulnerable against numerous attacks accordingly raising the need of security. In this paper, we propose a certificateless signcryption scheme based on the difficulty of solving the Diffie–Hellman problem. The simulation result proves that the scheme is secure against active and passive attacks using AVISPA (Automated Validation of Internet Security Protocols and Applications) tool.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. I. Chlamtac, M. Conti, J.J.N. Liu, Mobile ad hoc networking: imperatives and challenges. Ad Hoc Netw. 1(1), 13–64 (2003)

    Article  Google Scholar 

  2. P.M. Jawandhiya et al., A survey of mobile ad hoc network attacks. Int. J. Eng. Sci. Technol. 2.9, 4063–4071 (2010)

    Google Scholar 

  3. A. Shamir, Identity-based cryptosystems and signature schemes, in Advances in cryptology (Springer, Berlin Heidelberg, 1985)

    Google Scholar 

  4. Y. Zhang et al., Securing mobile ad hoc networks with certificateless public keys. Dependable Secure Comput. IEEE Trans. 3(4), 386–399 (2006)

    Google Scholar 

  5. Z. Zhang, W. Susilo, R. Raad, Mobile ad-hoc network key management with certificateless cryptography, in 2nd International Conference on Signal Processing and Communication Systems, 2008. ICSPCS 2008 (IEEE, 2008)

    Google Scholar 

  6. X. Boyen, Multipurpose identity-based signcryption, in Advances in Cryptology-CRYPTO 2003 (Springer, Berlin Heidelberg, 2003), pp. 383–399

    Google Scholar 

  7. L. Chen, J. Malone-Lee, Improved identity-based signcryption, in Public Key Cryptography-PKC 2005 (Springer, Berlin Heidelberg, 2005), pp. 362–379

    Google Scholar 

  8. S.S. Al-Riyami, K.G. Paterson, Certificateless public key cryptography, in Advances in Cryptology-ASIACRYPT 2003 (Springer, Berlin Heidelberg, 2003), pp. 452–473

    Google Scholar 

  9. Y. Zheng, Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption), in Advances in Cryptology—CRYPTO’97 (Springer, Berlin Heidelberg, 1997), pp. 165–179

    Google Scholar 

  10. X. Lv, H. Li, B. Wang, Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks. Secur. Commun. Netw. 6(1), 49–57 (2013)

    Article  Google Scholar 

  11. M. Barbosa, P. Farshim, Certificateless signcryption, in Proceedings of the 2008 ACM symposium on Information, computer and communications security (ACM, 2008)

    Google Scholar 

  12. W.-H. Liu, C.-X. Xu, Certificateless signcryption scheme without bilinear pairing. Ruanjian Xuebao J. Softw. 22(8), 1918–1926 (2011)

    Article  MathSciNet  Google Scholar 

  13. W. Xie, Z. Zhang, Efficient and provably secure certificateless signcryption from bilinear maps, in IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), 2010 (IEEE, 2010)

    Google Scholar 

  14. D-B. He, Security analysis of a certificateless signcryption scheme. Ruanjian Xuebao J. Softw. 24(3), 618–622 (2013)

    Google Scholar 

  15. W. Shi et al., Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing. Front. Comput. Sci. 8(4), 656–666 (2014)

    Google Scholar 

  16. B. Wang, J. Li, (t, n) Threshold signature scheme without a trusted party. Chin. J. Comput. 26(11), 1581–1584 (2003). (Chinese Edition)

    MathSciNet  Google Scholar 

  17. L.-C. Li, R.-S. Liu, Securing cluster-based ad hoc networks with distributed authorities. Wirel. Commun. IEEE Trans. 9(10), 3072–3081 (2010)

    Article  Google Scholar 

  18. H. Lee et al., ID-based key management scheme using threshold decryption for OPMD environment, in IEEE International Conference on Consumer Electronics (ICCE), 2012 (IEEE, 2012)

    Google Scholar 

  19. F. Miao et al., Fully self-Organized Key management scheme in MANET and its applications, in Computer Networks & Communications (NetCom) (Springer, New York, 2013), pp. 381–391

    Google Scholar 

  20. AVISPA, Automated validation of internet security protocols and applications. http://www.avispa-project.org/. Accessed on Sept 2015

  21. L. Vigan, Automated security protocol analysis with the AVISPA tool. Electron. Notes Theor. Comput. Sci. 155, 61–86 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Susmita Mandal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mandal, S., Mohanty, S., Majhi, B. (2018). Universally Verifiable Certificateless Signcryption Scheme for MANET. In: Nath, V. (eds) Proceedings of the International Conference on Microelectronics, Computing & Communication Systems. Lecture Notes in Electrical Engineering, vol 453. Springer, Singapore. https://doi.org/10.1007/978-981-10-5565-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5565-2_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5564-5

  • Online ISBN: 978-981-10-5565-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics