DocumentCode
259982
Title
PAPAR: Pairing Based Authentication Protocol with Anonymous Roaming for Wireless Mesh Networks
Author
Sultan, Nazatul Haque ; Sarma, Nityananda
Author_Institution
Dept. of Comput. Sci. & Eng., Tezpur Univ., Tezpur, India
fYear
2014
fDate
22-24 Dec. 2014
Firstpage
155
Lastpage
160
Abstract
In wireless networks, secure authentication protocol should enable a legitimate roaming user to get roaming services from foreign server when he/she is away from home domain. However, a basic authentication protocol requires participation of home server, foreign server and roaming user during the authentication between roaming user and foreign server. Recently, two-party based anonymous authentication protocols have been proposed, which does not require home server´s participation, to protect identity, location and route information of the roaming users. But, the available anonymous authentication protocols are not efficient due to the shortcomings in security and high computational cost. This paper addresses those problems and proposes a novel two-party based anonymous authentication protocol for the roaming users, named PAPAR. PAPAR uses pairing-based cryptography to secure and to provide computationally efficient authentication. Further, PAPAR uses pseudo identities to ensure user anonymity. Moreover, PAPAR efficiently mitigates the effect of DoS (Denial of Service) attack by using light computational operations, such as Message Authentication Code. Comparison and experimental results show that PAPAR outperforms the existing works in terms of security and computational cost.
Keywords
cryptographic protocols; message authentication; telecommunication security; wireless mesh networks; DoS attack effect; PAPAR; anonymous roaming; authentication protocol security; computational cost; computationally-efficient authentication; denial-of-service attack; foreign server; home server; identity protection; location information; message authentication code; pairing-based authentication protocol; pairing-based cryptography; roaming services; roaming users; route information; two-party-based anonymous authentication protocols; user anonymity; wireless mesh networks; Authentication; Manganese; Nickel; Protocols; Roaming; Servers; Anonymity; Authentication; Denial of Service Attack; Efficiency; Security;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Technology (ICIT), 2014 International Conference on
Conference_Location
Bhubaneswar
Print_ISBN
978-1-4799-8083-3
Type
conf
DOI
10.1109/ICIT.2014.36
Filename
7033314
Link To Document