Security and Privacy enforced wireless mobile communication using PI-MAKA protocol design

The fast development of mobile networks and compact mobile devices bring attention to the users for wireless mobile communication. But providing security and protecting the privacy of users are the main challenges of wireless mobile communication. Recently, Authenticated Key Agreement protocols are...

Full description

Bibliographic Details
Main Authors: T Senthil Kumar, S Prabakaran
Format: Article
Language:English
Published: SAGE Publishing 2019-09-01
Series:Measurement + Control
Online Access:https://doi.org/10.1177/0020294019842893
id doaj-880e91ac6890473c896f48d774485bcc
record_format Article
spelling doaj-880e91ac6890473c896f48d774485bcc2020-11-25T03:52:30ZengSAGE PublishingMeasurement + Control0020-29402019-09-015210.1177/0020294019842893Security and Privacy enforced wireless mobile communication using PI-MAKA protocol designT Senthil KumarS PrabakaranThe fast development of mobile networks and compact mobile devices bring attention to the users for wireless mobile communication. But providing security and protecting the privacy of users are the main challenges of wireless mobile communication. Recently, Authenticated Key Agreement protocols are used for secure and reliable communication in wireless mobile communication. However, the User-to-User Mutual Authentication and Key Agreement scheme is based on bilinear pairings, which involves relatively high computation cost when compared to elliptic curve scalar point multiplication. Hence, in this paper, we propose a Pairing-Free Identity-Based Mutual Authentication and Key Agreement protocol for wireless mobile communications. It consists of the following phases: Setup and Key generation, Mobility Management Entity authentication and Proxy Signature generation, Proxy Signature verification and User-to-User authentication. Experimental results show that Pairing-Free Identity-Based Mutual Authentication and Key Agreement attains significantly less computational and communication cost when compared to User-to-User Mutual Authentication and Key Agreement scheme.https://doi.org/10.1177/0020294019842893
collection DOAJ
language English
format Article
sources DOAJ
author T Senthil Kumar
S Prabakaran
spellingShingle T Senthil Kumar
S Prabakaran
Security and Privacy enforced wireless mobile communication using PI-MAKA protocol design
Measurement + Control
author_facet T Senthil Kumar
S Prabakaran
author_sort T Senthil Kumar
title Security and Privacy enforced wireless mobile communication using PI-MAKA protocol design
title_short Security and Privacy enforced wireless mobile communication using PI-MAKA protocol design
title_full Security and Privacy enforced wireless mobile communication using PI-MAKA protocol design
title_fullStr Security and Privacy enforced wireless mobile communication using PI-MAKA protocol design
title_full_unstemmed Security and Privacy enforced wireless mobile communication using PI-MAKA protocol design
title_sort security and privacy enforced wireless mobile communication using pi-maka protocol design
publisher SAGE Publishing
series Measurement + Control
issn 0020-2940
publishDate 2019-09-01
description The fast development of mobile networks and compact mobile devices bring attention to the users for wireless mobile communication. But providing security and protecting the privacy of users are the main challenges of wireless mobile communication. Recently, Authenticated Key Agreement protocols are used for secure and reliable communication in wireless mobile communication. However, the User-to-User Mutual Authentication and Key Agreement scheme is based on bilinear pairings, which involves relatively high computation cost when compared to elliptic curve scalar point multiplication. Hence, in this paper, we propose a Pairing-Free Identity-Based Mutual Authentication and Key Agreement protocol for wireless mobile communications. It consists of the following phases: Setup and Key generation, Mobility Management Entity authentication and Proxy Signature generation, Proxy Signature verification and User-to-User authentication. Experimental results show that Pairing-Free Identity-Based Mutual Authentication and Key Agreement attains significantly less computational and communication cost when compared to User-to-User Mutual Authentication and Key Agreement scheme.
url https://doi.org/10.1177/0020294019842893
work_keys_str_mv AT tsenthilkumar securityandprivacyenforcedwirelessmobilecommunicationusingpimakaprotocoldesign
AT sprabakaran securityandprivacyenforcedwirelessmobilecommunicationusingpimakaprotocoldesign
_version_ 1724482576180051968