An Efficient Protocol for Privacy and Authentication for Resource-Constrained Devices in Wireless Networks

An Efficient Protocol for Privacy and Authentication for Resource-Constrained Devices in Wireless Networks

Clifton Mulkey (Texas A &M University - Corpus Christi, Corpus Christi, TX, USA), Dulal Kar (Texas A &M University - Corpus Christi, Corpus Christi, TX, USA) and Ajay Katangur (Texas A &M University - Corpus Christi, Corpus Christi, TX, USA)
Copyright: © 2013 |Pages: 20
DOI: 10.4018/ijcwt.2013040103

Abstract

The authors envision a scenario for security of wireless networks that include and integrate nodes of all different capabilities, including tiny sensors or similarly battery-powered, resource-constrained tiny nodes. However, the existing Wireless Protected Access (WPA) protocol that supports security services for wireless networks today may not be suitable for such resource-constrained, low-end nodes since its existing authentication and privacy mechanisms are complex and computationally intensive. In this work, the authors propose an efficient protocol for authentication and privacy in wireless networks using identity-based encryption (IBE) techniques. Specifically, the authors propose an enhanced and extended version of the WPA protocol by incorporating IBE based authentication methods in the existing WPA protocol at the link layer level. The enhanced WPA protocol can be used for small and resource-constrained wireless devices to integrate them in existing wireless networks. Their proposed protocol is proven to be secure against common attacks and vulnerabilities in wireless networks. Also, the authors’ analysis of the protocol shows that it is feasible and efficient in terms of computation, communication, and storage overheads to support many resource-constrained devices.
Article Preview

2. Literature Review

Our proposed protocol for resource constrained wireless devices is an application of identity based encryption to extend and accommodate the existing WPA protocol. In the following, we provide a brief overview of identity based encryption, pairing based cryptography, and the WPA protocol in relation to the development of the new protocol.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 9: 4 Issues (2019): Forthcoming, Available for Pre-Order
Volume 8: 4 Issues (2018): 2 Released, 2 Forthcoming
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing