Browse > Article

Authority Delegation Scheme for Secure Social Community Creation in Community-Based Ubiquitous Networks  

Roh, Hyo-Sun (School of electronic Engineering, Soongsil University)
Jung, Sou-Hwan (School of electronic Engineering, Soongsil University)
Publication Information
Abstract
This paper proposes authority delegation for secure social community creation and mutual authentication scheme between the community members using proxy signature in community-based ubiquitous networks. In community-based ubiquitous network, User's context-awareness information is collected and used to provide context-awareness network service and application service for someone who need it. For the many reason, i.e. study, game, information sharing, business and conference, social community could be created by members of a social group. However, in community-based ubiquitous network, this kind of the context-awareness information could be abused and created by a malicious nodes for attack the community. Also, forgery community could be built up to attack the community members. The proposed scheme using the proxy signature provides a mutual authentication and secure secret key exchange between community members, and supports secure authority delegation that can creates social community. Also, when delegation of signing authority and mutual authentication, this scheme reduces total computation time compared to the RSA signature scheme.
Keywords
Diffie-Hellman; Ad-hoc;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. Argyroudis and D. O'Mahony, "Secure routing for mobile ad hoc networks," Communications surveys & Tutorials, IEEE volume 7, pp. 2-21, 2005.
2 K. Namhi, P. Ilkyun, and K. Younghan, "Ubiquitous zone networking technologies for multi-hop based wireless communications," IWSOS 2006, LNCS 4124, September 2006.
3 C. Jaeduck, R. Hyosun, J. Souhwan, and K. Younghan, "Support of Context-awareness in Ubiquitous Networks using Smart Packet," IPSJ SIG 2005, pp. 275-280, 2005.
4 C. Siva Ram Murthy and B. S, Manoj, "Ad Hoc Wireless Networks Architectures and Protocols," Prentice Hall PTR, 2004.
5 C. P. Schnorr, "Efficient Identification and Signatures for Smart cards," Advances of Cryptology- CRYPTO '89, LNCS, pp. 239-251, January, 1989.
6 K. Nyberg and R. A. Rueppel, "Message recovery for signature scheme based on the discrete logarithm problem," Eurocrypt '94 proceedings, 1995.
7 T. ElGamal, "A Public Key Cryptosystem and a signature scheme based on discrete logarithms," Advances of Cryptology-CRYPTO '84, LNCS 196, pp. 10-18, 1985.
8 F Zhang, R Safavi-Naini and CY Lin, "New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairings," Advances in Cryptology-Asiacrypt 2002, LNCS 2510, 2002.
9 D. Simon, B. Aboba and R. Hurst, "The EAP-TLS Authentication Protocol," IETF RFC 5216, March 2008.
10 W. Diffie and M. E. Hellman, "Multi cryptographic techniques," AFIPS Conference Proceedings, pp. 109-112, 1976.
11 S. Corson and J. Macker, "Mobile ad-hoc networking (MANET)," IETF RFC 2051, January 1999.
12 FIPS PUB XX, "Digital Signature Standard (DSS)," February, 1993.
13 M. Mambo, K. Usuda, and E. Okamoto, "Proxy signatures: Delegation pf the power to sign message," IEICE Teans, E79-A, pp. 1338-1354, 1996.
14 R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystem," Commun. ACM, pp. 120-126, 1978.