PF-AID-2KAP: Pairing-Free Authenticated Identity-Based Two-Party Key Agreement Protocol for Resource-Constrained Devices
An adequate construction of shared session key for wireless-resource constrained devices is a challenging task than conventional wired, memory and power-rich devices. Since several two-party key establishment schemes have been proposed but they are not suitable for resource-constrained devices. It has been seen that pairing operations on elliptic curves are computationally more costly than scalar multiplication and addition operations on the elliptic curve. In this article, we proposed pairing-free two-party authenticated ID-based key agreement protocol (PF-AID-2KAP) for such resource constrained devices. Under the assumption to solve ECDLP and CDHP problems, the propose PF-AID-2KAP scheme is provably secure. Further, we show that the key agreement scheme is resilience to following adversarial attacks: perfect forward secrecy, MITM attack, key control, known session key security. As compared to other schemes, our proposed system have less running time, less bandwidth cost and takes less number message exchange during communication.
KeywordsIdentity based cryptosystem Elliptic curve cryptosystem Key agreement protocol Resource- constrained devices
This research work has been partially supported by the Council of Scientific and Industrial Research, a research and development organization in India, with sanctioned no. 09/263(1052)/2015 EMR-I and the UPE-II grant received from JNU. Additionally, the author would like to sincere thanks to the anonymous reviewers for their fruitful comments.
- 4.Oliveira, L.B., Aranha, D.F., Morais, E., Daguano, F., López, J., Dahab, R.: Tinytate: computing the tate pairing in resource-constrained sensor nodes. In: Sixth IEEE International Symposium on Network Computing and Applications, NCA 2007, pp. 318–323 (2007)Google Scholar
- 7.Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) Wireless Sensor Networks. EWSN 2008. LNCS, vol. 4913, pp. 305–320. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-77690-1_19CrossRefGoogle Scholar
- 12.Kumar, M., Katti, C.P., Saxena, P.C.: A secure anonymous e-voting system using identity-based blind signature scheme. In: Shyamasundar, Rudrapatna K., Singh, V., Vaidya, J. (eds.) ICISS 2017. LNCS, vol. 10717, pp. 29–49. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72598-7_3CrossRefGoogle Scholar
- 17.Kumar, M., Katti, C.P., Saxena, P.C.: An ID-based authenticated key exchange protocol. Int. J. Adv. Stud. Comput. Sci. Eng. 4(5), 11 (2015)Google Scholar
- 21.Islam, S.K.H., Biswas, G.P.: A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication. J. King Saud Univ. Inf. Sci. 29, 63–73 (2015)Google Scholar
- 28.Xiong, X., Wong, D.S., Deng, X.: TinyPairing: a fast and lightweight pairing-based cryptographic library for wireless sensor networks. In: 2010 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–6 (2010)Google Scholar
- 29.Messer, A., et al.: Towards a distributed platform for resource-constrained devices. In: Proceedings of the 22nd International Conference on Distributed Computing Systems, pp. 43–51 (2002)Google Scholar