An Efficient Mobile Authentication Protocol for Wireless Communications Using Rabin PublicKey Cryptosystem
DOI:
https://doi.org/10.51983/ajcst-2012.1.1.1675Keywords:
Security, Cryptographic algorithms, RSA, Elliptic Curve Cryptography, Rabin Public-key Cryptosystem, J2MEAbstract
The past few years have witnessed an explosive growth in the use of mobile devices as the enabling technology for accessing Internet based services, as well as for personal communication needs in networking environments. Most studies indicate that it is impossible to utilize strong cryptographic functions for implementing security protocols on mobile devices. Our work refutes this. Specifically, we present a performance analysis focused on the most commonly used cryptographic protocols for mobile applications and we proposed provably secure authentication protocol that is more efficient than any of the existing authentication protocol in the literature. The increasing progress in wireless mobile communication has attracted an important amount of attention on the security issue. To provide secure communication for mobile devices, authenticated protocol is an important primitive for establishing trusted connection. In this work, we focus on an important constraint of such devices – battery life – and examine how it is impacted by the use of security protocols. We believe such investigations to be an important first step toward addressing the challenges of energy-efficient security for battery-constrained systems. Our result shows that proposed authentication protocol provides a better security guarantee and incurs much less energy consumption than the existing authentication protocols. Finally, performance analysis will show that compared with existing authentication protocols, our proposed scheme is to be more simple, secure and efficient.
References
M. J. Beller, L. F. Chang, and Y. Yacobi, “Privacy and authentication on a portable communications system,” IEEE J. Sel. Areas Commun., vol. 11, pp. 821-829, 1993.
C. C. Lo and Y. J. Chen, “Secure communication mechanisms for GSM networks,” IEEE Trans. Consum. Electron., vol. 45, pp. 1074-1080, 1999.
T.-F. Lee, C.-C. Chang, and T. Hwang, “Private authentication techniques for the global mobility network,” Wireless Personal Commun., vol. 35, no. 4, pp. 329-336, 2005.
T.-F. Lee, S.-H. Chang, T. Hwang, and S.-K. Chong, “Enhanced Delegation-Based Authentication Protocol for PCSs,” IEEE Trans. Wireless Commun., vol. 8, no. 5, pp. 2166-2171, 2009.
H.-Y. Lin and L. Harn, “Authentication protocols with non-repudiation services in personnel communication systems,” IEEE Commun. Lett., vol. 3, no. 8, pp. 236-238, 1999.
H.-Y. Lin, “Security and authentication in PCS,” Comput. Elect. Eng., vol. 25, no. 4, pp. 225-248, 1999.
W.-B. Lee and C.-K. Yeh, “A new delegation-based authentication protocol for use in portable communication systems,” IEEE Trans. Wireless Commun., vol. 4, no. 1, pp. 57-64, 2005.
M. Rahnema, “Overview of the GSM system and protocol architecture,”IEEE Commun. Mag., pp. 92-100, 1993.
Dr.R.Shanmugalakshmi(2009),“Research Issues on Elliptic Curve Cryptography and Its applications - IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.6, June 2009, Pg.No :19 – 22.
Marisa W. Paryasto (2009), “Issues in Elliptic Curve Cryptography Implementation ”- Internetworking Indonesia Journal, Volume 1/No. 1(2009), Pg.No 29-33.
S. Prasanna Ganesan, Dr. GRD College of Science, “An Asymmetric Authentication Protocol for Mobile Devices Using Elliptic Curve Cryptography” 978-1-4244-5848-6/10/$26.00 © 2010 IEEE, Pg.No 107-109.
Wendy Chou,Dr. Lawrence Washington,”Elliptic Curve Cryptography and Its Applications to Mobile Devices.” Department of Mathematics University of Maryland, College Park.
S. Prasanna Ganesan, Dr. GRD College of Science, “An Authentication Protocol For Mobile Devices Using Hyperelliptic Curve Cryptography” International Journal of Recent Trends in Engineering and Technology, Vol. 3, No. 2, May 2010.
“A Performance Comparison of Data Encryption Algorithms,” IEEE [Information and Communication Technologies, 2005. ICICT 2005. First International Conference ,2006-02-27, PP. 84- 89.
Results of comparing tens of encryption algorithms using different settings- Crypto++ benchmark- . etrieved October 1, 2008, from: http://www.eskimo.com/~weidai/benchmarks.html
S.Z.S. Idrus,S.A.Aljunid,S.M.Asi, ‘’Performance Analysis of Encryption Algorithms Text Length Size on Web Browsers,’’ IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.1, January 2008 ,Pg 20-25.
Caimu Tang, Member, IEEE, and Dapeng Oliver Wu, Senior Member, IEEE” -An Efficient Mobile Authentication Scheme for wireless networks” IEEE transactions on wireless communications, vol. 7, NO. 4, APRIL 2008.
Anoop MS, “ Elliptic curve Cryptography”, available at http://security.ittoolbox.com/research/elliptic-curvecryptography,5 Jan 2007
J. Lopez, R. Dahab (2000), “An overview of elliptic curve cryptography”, Technical report, IC-00-10, May 22. Available at <http://www.dcc.unicamp.br/ic-main/public-cation - e.html>.
Standard Specifications for Public Key Cryptography, IEEE Standard 1363, 2000.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2012 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.