{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T23:13:03Z","timestamp":1654125183564},"reference-count":26,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4,1]]},"abstract":"<p>The authors envision a scenario for security of wireless networks that include and integrate nodes of all different capabilities, including tiny sensors or similarly battery-powered, resource-constrained tiny nodes. However, the existing Wireless Protected Access (WPA) protocol that supports security services for wireless networks today may not be suitable for such resource-constrained, low-end nodes since its existing authentication and privacy mechanisms are complex and computationally intensive. In this work, the authors propose an efficient protocol for authentication and privacy in wireless networks using identity-based encryption (IBE) techniques. Specifically, the authors propose an enhanced and extended version of the WPA protocol by incorporating IBE based authentication methods in the existing WPA protocol at the link layer level. The enhanced WPA protocol can be used for small and resource-constrained wireless devices to integrate them in existing wireless networks. Their proposed protocol is proven to be secure against common attacks and vulnerabilities in wireless networks. Also, the authors\u2019 analysis of the protocol shows that it is feasible and efficient in terms of computation, communication, and storage overheads to support many resource-constrained devices.<\/p>","DOI":"10.4018\/ijcwt.2013040103","type":"journal-article","created":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T18:45:19Z","timestamp":1393353919000},"page":"38-57","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Protocol for Privacy and Authentication for Resource-Constrained Devices in Wireless Networks"],"prefix":"10.4018","volume":"3","author":[{"given":"Clifton","family":"Mulkey","sequence":"first","affiliation":[{"name":"Texas A &M University - Corpus Christi, Corpus Christi, TX, USA"}]},{"given":"Dulal","family":"Kar","sequence":"additional","affiliation":[{"name":"Texas A &M University - Corpus Christi, Corpus Christi, TX, USA"}]},{"given":"Ajay","family":"Katangur","sequence":"additional","affiliation":[{"name":"Texas A &M University - Corpus Christi, Corpus Christi, TX, USA"}]}],"member":"2432","reference":[{"key":"ijcwt.2013040103-0","unstructured":"Anoop, M. (2007, May). Elliptic curve cryptography: An implementation tutorial. Retrieved August 30, 2012, from http:\/\/www.infosecwriters.com\/text_resources\/pdf\/Elliptic_Curve_AnnopMS.pdf."},{"key":"ijcwt.2013040103-1","doi-asserted-by":"crossref","unstructured":"Barreto, P., & Naehrig, M. (2006). Pairing-friendly elliptic curves of prime order. Selected Areas in Cryptography (SAC 2005) (pp. 319-331). Springer.","DOI":"10.1007\/11693383_22"},{"key":"ijcwt.2013040103-2","doi-asserted-by":"crossref","unstructured":"Beuchat, J.-L., L\u00f3pez-Trejo, E., Mart\u00ednez-Ramos, L., Mitsunari, S., & Rodr\u00edguez-Henr\u00edquez, F. (2009, December). Multi-core implementation of the tate pairing over supersingular elliptic curves. In Proceedings of the 8th International Conference in Cryptology and Network Security (pp. 12-14).","DOI":"10.1007\/978-3-642-10433-6_28"},{"key":"ijcwt.2013040103-3","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"ijcwt.2013040103-4","unstructured":"Brown, D. R. (2010, January). Sec 2: Recommended elliptic curve domain parameters. Retrieved from www.secg.org\/collateral\/sec2_final.pdf"},{"key":"ijcwt.2013040103-5","unstructured":"Eaton, D. (n.d.). Diving into the 802.11i spec: A tutorial. EETimes News and Analysis. Retrieved August 30, 2012, from http:\/\/www.eetimes.com\/electronics-news\/4143367\/Diving-into-the-802-11i-Spec-A-Tutorial"},{"key":"ijcwt.2013040103-6","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-009-9048-z"},{"key":"ijcwt.2013040103-7","first-page":"35","author":"P.Grabher","year":"2008","journal-title":"On software parallel implementation of cryptographic pairing. Selected Areas in Cryptology"},{"key":"ijcwt.2013040103-8","doi-asserted-by":"crossref","unstructured":"Kar, D. C., Ngo, H. L., & Mulkey, C. J. (2011). Applied cryptography in wireless sensor networks. Nemati & Yang (Eds.), Applied cryptography for cyber security and defense: information encryption and cyphering (pp. 146\u2013167). IGI Global.","DOI":"10.4018\/978-1-61520-783-1.ch006"},{"key":"ijcwt.2013040103-9","first-page":"435","author":"J. F.Kurose","year":"2008","journal-title":"The link layer and local area networks. Computer networking: A top-down approach"},{"key":"ijcwt.2013040103-10","unstructured":"Lashkari, A., Danesh, M., & Samadi, B. (2009). A survey on wireless security protocols (wep, wpa and wpa2\/802.11i). In Proceedings of the Second IEEE International Conference on, Computer Science and Information Technology (ICCSIT) (pp. 48-52)."},{"key":"ijcwt.2013040103-11","doi-asserted-by":"crossref","unstructured":"Liu, A., & Ning, P. (2008). TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In Proceedings of the 7th International Conference on Information Processing in Sensor Networks (SPOTS Track) (pp. 245-256).","DOI":"10.1109\/IPSN.2008.47"},{"key":"ijcwt.2013040103-12","unstructured":"MacMichael, J. L. (n.d.). Auditing wi-fi protected access (WPA) pre-shared key mode. Linux Journal, 137. Retrieved August 30, 2012, from http:\/\/www.linuxjournal.com\/article\/8312"},{"key":"ijcwt.2013040103-13","doi-asserted-by":"crossref","unstructured":"Markovic, M. (2007). Data protection techniques, cryptographic protocols and pki systems in modern computer networks. In Proceedings of the 14th International Workshop on Systems, Signals, and Image Processing and 6th EURASIP Conference focused on Speech and Image Processing, Multimedia Communications, and Services (pp. 13-24).","DOI":"10.1109\/IWSSIP.2007.4381086"},{"key":"ijcwt.2013040103-14","unstructured":"NIST. (2007, March). Recommendation for key management - part 1: General, National Institute of Standards and Technology (NIST). Retrieved August 30, 2012, from http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-57\/sp800-57-Part1-revised2_Mar08-2007.pdf"},{"key":"ijcwt.2013040103-15","doi-asserted-by":"crossref","unstructured":"Oliveira, L., Aranha, D., Morais, E., Daguano, F., Lopez, J., & Dahab, R. (2007). Tinytate: Computing the tate pairing in resource-constrained sensor nodes. In Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA) (pp. 318-323).","DOI":"10.1109\/NCA.2007.48"},{"key":"ijcwt.2013040103-16","unstructured":"\u201cPairing\u201d. (n.d.). The pairing based crypto lounge. Retrieved August 30, 2012, from http:\/\/www.larc.usp.br\/~pbarreto\/pblounge.html"},{"key":"ijcwt.2013040103-17","unstructured":"Sakai, R., & Kasahara, M. (2003). Id based cryptosystems with pairing on elliptic curve. Cryptology ePrint Archive, Report 2003\/054. Retrieved August 8, 2012, from http:\/\/eprint.iacr.org\/2003\/054"},{"key":"ijcwt.2013040103-18","author":"B.Schneier","year":"1996","journal-title":"Applied cryptography"},{"key":"ijcwt.2013040103-19","first-page":"47","article-title":"Identity based cryptosystems and signatures","author":"A.Shamir","year":"1984","journal-title":"Proceedings of Cryptology"},{"key":"ijcwt.2013040103-20","author":"W.Stallings","year":"2005","journal-title":"Wireless communications and networks"},{"key":"ijcwt.2013040103-21","doi-asserted-by":"crossref","unstructured":"Szczechowiak, P., & Collier, M. (2009). Tinyibe: Identity-based encryption for heterogeneous sensor networks. In Proceedings of the Fifth International Conference on Intelligent Sensors, Sensor Networks, and Information Processing (ISSNIP) (pp. 319-354).","DOI":"10.1109\/ISSNIP.2009.5416743"},{"key":"ijcwt.2013040103-22","doi-asserted-by":"crossref","unstructured":"Szczechowiak, P., Kargl, A., Scott, M., & Collier, M. (2009). On the application of pairing based cryptography to wireless sensor networks. In Proceedings of the Second ACM Conference on Wireless Network Security (WiSec 2009) (pp. 1-12). New York, NY: ACM.","DOI":"10.1145\/1514274.1514276"},{"key":"ijcwt.2013040103-23","unstructured":"\u201cTate Pairing\u201d. (2009). Multi-core implementation of the tate pairing over supersingular elliptic curves (source code). Retrieved May 7, 2011, from: http:\/\/delta.cs.cinvestav.mx\/~francisco\/temp\/Page-TatePairing2009\/TatePairing-2009.html"},{"key":"ijcwt.2013040103-24","unstructured":"\u201cWireshirk\u201d. (n.d.). Wireshark network protocol analyzer. Retrieved August 30, 2012, from www.wireshark.org"},{"key":"ijcwt.2013040103-25","doi-asserted-by":"crossref","unstructured":"Xiong, X., Wong, D., & Deng, X. (2010). Tinypairing: A fast and lightweight pairing-based cryptographic library for wireless sensor networks. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1-6).","DOI":"10.1109\/WCNC.2010.5506580"}],"container-title":["International Journal of Cyber Warfare and Terrorism"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=101939","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T22:37:23Z","timestamp":1654123043000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcwt.2013040103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,4,1]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcwt.2013040103","relation":{},"ISSN":["1947-3435","1947-3443"],"issn-type":[{"value":"1947-3435","type":"print"},{"value":"1947-3443","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4,1]]}}}