IOSR Journals
IOSR Journals
IOSR Journals
and set
2
w g
= .
2. Select
*
i p
grp RZ
For a registered user group I.
3. Using , generate an SDH tuple
,
( , , )
i j i j
A grp x by selecting
*
j p
x RZ
such that 0
i j
grp x + + = , and
setting
1/( )
1
i j
grp x
ij
A g
+ +
.
4. Repeat Step 3 for a prearranged number of times that are mutually agreed by NO and the user group
manager
i
GM .
5. Send {[ , ], , ) }
i i j
GM i j grp x j via a secure channel.
6. Repeat Steps 2, 3, and 4 for every user group.
AACT: Anonymous and Accountable communication topology for Wireless Mesh Networks
www.iosrjournals.org 5 | P a g e
7. Send TTP:
,
{[ , ], ) , }
i i j j
GM i j A x i j via a secure channel, where 0 denotes bitwise exclusive OR
operation.
The above operation generates the group public key gpk and a number of private keys gsk:
1 2
,
( , , )
{ [ , ] ( , , ) , }.
i j i j
gpk g g w
gsk i j A grp x i j
=
Furthermore, NO obtains a set of revocation tokens, grt, with grt[i,j] =
, i j
A and also keep the mapping among
group id i and
i
grp for all user groups. Note that is the system secret only known to NO. For the purpose of
non denial, NO signs on Steps 5 and 7 under a standard digital signature scheme, such as ECDSA [13]. In
AACT, we suppose that ECDSA-160 is used. For the same purpose,
i
GM and TTP also sign on these messages
upon receiving and send the resulted signature back to NO.
Additionally, NO prepares every mesh router
k
MR a public/private key pair, denoted by ( , )
k k
RPK RSK . Each
mesh router also gets an accompanied public key
A certificate signed by NO to prove key authenticity. The signing key pair of NO is denoted by (NPK, NSK).
The certificate has the following fields at the minimum:
{ , , , },
k k k NSK
Cert MR RPK ExpT Sig =
Where ExpT is the expiration time and Sig, denotes an ECDSA-160 signature signed on a given message using a
private key .
Before accessing the WMN, a network user has to validate himself to his fit in user groups. For each such user
group i, a network user
j
uid is assigned a casual group private key as follows:
1.
i
GM sends ( , , , )
j i j
uid i j grp x as well as the related system parameters.
2.
i
GM requests TTP to send
,
( , , )
j i j j
uid i j A x by providing the index [i, j].
3.
j
uid assembles his group private key as
,
[ , ] ( , , )
i j i j
gsk i j A grp x = .
Note that in our setting,
i
GM only keeps the mapping of ( ( , , , ))
j i j
uid i j grp x but has no knowledge of the
corresponding
, i j
A .
NO only knows the mapping of ( , [ , ])
i
GM gsk i j but has no knowledge about to whom gsk [i, j] is
assigned.
TTP has the mapping of
,
( ( , ))
j i j j i
uid A x grp as it sends
j
uid this information through a safe channel
among the two upon the request from
i
GM . But TTP has no knowledge of the corresponding
j
x or
, i j
A .
Here, we use
j
uid the user's necessary attribute information. For the purpose of non repudiation,
j
uid signs on
the messages it receives from
i
GM and TTP under ECDSA-160, and sends back
i
GM the equivalent
signature.
4.2 User-Router Mutual Authentication and Key Agreement
To access the WMN, a network user follows the user-router common authentication and key agreement
protocol as particular below, when a mesh router is within his direct communication range.
1. The mesh router
k
MR first picks a random nonce
*
R p
r RZ
, compute
j
r
g , and prepare the current timestamp
2
ts . Further get two
generators ( , ) u v in
2
G from
0
H as
2
0 2 2
( , ) ( , , , ) ,
j
R
r
r
u v H gpk g g ts r G e (1)
And compute their images in
1
: ( ) ( ). G u u andv v
Compute
1 2 , i j
T u andT A v
o o
by selecting an exponent . ( )
p i j p
RZ Set grp x Z o o o + e
. Pick
blinding values ,
x
r r
o
, and
p
r RZ
o
.
Compute helper values
1 2
, R R , and
3
R :
1 2 2 2 2
, ( , ) . ( , ) . ( , ) ,
x
r r r r
R u R e T g e v w e v g
o o o
and
3 1
. .
x
r r
R T u
o
Compute a challenge
value
p
c Z e using H:
2 1 2 1 2 3 .
( , , , , , , , , , )
j
R
r
r
p
c H gpk g g ts r T T R R R Z e
Compute , ( )
x x i j
s r c s r c grp x
o o
o = + = + + and .
p
s r c Z
o o
o = + e Obtain the group signature
on
2
{ , , }
j
R
r
r
g g ts as
[ , ] 1 2
( , , , , , , ).
gsk i j x
SIG r T T c s s s
o o
Compute the shared symmetric key with
k
MR :
,
( )
j
R
r
r
k j
K g = .
Unicast back to
k
MR
2 [ , ]
, , ,
j
R
r
r
gsk i j
g g ts SIG . (M.2)
Upon receipt of (M.2),
k
MR carries out the following to authenticate
j
uid :
Check
R
r
g and
2
ts make sure the freshness of (M.2).
Check that
[ , ] gsk i j
SIG is a valid signature by applying the group public key gpk as follows:
Compute u and v using (1), and their images
u and v in
1
: ( ) ( ). G u u andv v
Retrieve
1 2
, R R and
3
R as:
1 1
/
s c
R u T
o
2 2 2 2 1 2
( , ) . ( , ) .( ( , ) / ( , )) ,
z
s s c
R e T g e v w e T w e g g
o
And
3 1
. .
z
s s
R T u
o
Check that the challenge c is correct:
2 1 2 1 2 3
? ( , , , , , , , , , ).
j
R
r
r
c H gpk g g ts r T T R R R
=
(2)
For each revocation token A eURL, check whether A is encoded in
1 2
( , ) T T by checking if
2 1
( / , )? ( , ). e T A u e T v
=
(3)
If no revocation token of the URL is encoded in
1 2
( , ) T T , then the signer of
[ , ] gsk i j
SIG has not been revoked.
If all the above checks succeed,
k
MR is now assured that the current user is a legitimate network user,
although
k
MR does not know which particular user this is. Note that
j
uid is never disclosed or transmitted
during protocol execution.
AACT: Anonymous and Accountable communication topology for Wireless Mesh Networks
www.iosrjournals.org 7 | P a g e
a.
k
MR Further computes the shared symmetric key as
,
( )
j
R
r
r
k j
K g = and sends back
j
uid :
,
, , ( , , ),
j j
R R
k j
r r
r r
K k
g g E MR g g (M.3)
Where E denotes the symmetric encryption of the given message within the brackets using key .
The above protocol allows explicit mutual authentication among a mesh router and a genuine network user; it
also enables unilateral anonymous authentication for the network user. Upon successful completion of the
protocol, the mesh router and the user also create a shared symmetric key used for the succeeding
communication session. And this session is uniquely identified through ( , )
j
R
r
r
g g .
Remarks
Equation (2) holds because
1 1 1
/ / ( ) .
s r c c
R u T u u u R
o o
o o o +
= = = =
( ) . . 2 2
2 2 2 2 2 2 2 2 2 2
1 2 1 2
2 2
2 2
1 2
( , ) ( , )
( , ) . ( , ) . ( , ) ( ( , ) . ( , ) . ( , ) ).( ( , ) . ( , ) . ( , ) .
( , ) ( , )
(
( , )
. .
( , )
i j i j z z
i j
c
grp x grp x s s r s s r
c
grp x
e T w e T w
R e T g e v w e v g e T g e v w e v g e T g e v w e v g c
e g g e g g
e A
e T v wg
R R
e g g
o o o o
o o
o
+ +
+
| |
= =
|
\ .
| |
= =
|
|
\ .
, 2
1 2
2 2
1 2 1 2
, )
( , )
. .
( , ) ( , )
i j
c
c grp x
i j
wg
e g g
R R
e g g e g g
+
| |
| |
= = |
|
|
\ .
\ .
( ) (
3 1 1 3
( ) . ( ) . . .
z i j i j
z z z
r c grp x r c grp x
s r r s r r
R T u u u u u T u R
o
o o o
o
o o
+ + +
= = = = =
Equation (3) holds when there is an element A of URL encoded in
1 2
( , ) T T because of the following.
We know that :
2 1
G G is an isomorphism such that
2 1
( ) . g g = According to the
definition of isomorphism, we have ( ) ( ) ( ) PQ P Q = for any P, Q
2
. G e Using this property and
mathematical induction, it is easy to know the following fact: For any natural number
2 1
, ( ) .
m m
m N g g e =
Hence, if a group private key
,
( , , )
i j i j
A grp x with
, i j
A URL e signed the group signatureo . For
simplicity, let
2 2
b
u g andv g
o
= = for some integers a and b. On one hand,
2 , , , 2 1 2 1 2
( / , ) ( / , ) ( , ) (( ( )) , ) (( ( )) , ) (( ) , ) ( , ) .
b b ab
i j i j i j
e T A u e A v A u e v u e v u e g u e g g e g g
o o o o o o o
= = = = = =
On the other hand,
1 2 1 2 1 2
( , ) ( , )) (( ( )) , ) (( ( )) , ) (( ) , ) ( , ) .
b ab
e T v e u v e u v e g v e g g e g g
o o o o o o o
= = = = =
Therefore,
2 , 1
( / , ) ( , ).
i j
e T A u e T v =
4.3 User-User Mutual Authentication and Key Agreement In AACT
Adjacent genuine network users may help to relay each others traffic. To this end, two network users
within each others direct communication range first authenticate each other and create shared secret pairwise
key as follows:
1.
j
uid picks a random nonce
*
j p
r RZ
,
I
uid checks the time stamp and verifies the authenticity of
[ , ] gsk i j
SIG by
applying the group key gpk following Step 3b, as in Section 4.2.
I
uid further checks if the signature is
generated from a revoked group private key following Step 3c, as in Section 4.2. Note that URL can always be
obtained from the beacon messages.
If all checks succeed,
I
uid is assured that the current user it communicates with is legitimate.
I
uid proceeds to
pick a random nonce
*
I p
r RZ
and computes
I
r
g .
I
uid further signs on ,
j
I
r
r
g g , and current time stamp
2
ts ,
AACT: Anonymous and Accountable communication topology for Wireless Mesh Networks
www.iosrjournals.org 8 | P a g e
using an appropriate group private key gsk[t, I] of his.
I
uid also computes the shared pairwise session key
as
,
( ) .
j
I
j I
r
r
r r
K g = then replies
I
uid
2 [ , ].
, , ,
j
I
r
r
gsk t I
g g ts SIG ( .2) M
3. Upon receipt of ( .2) M
,
j
uid first delay window.
j
uid checks whether
2
ts -
1
ts is within the acceptable
delay window.
j
uid also examines
[ , ] gsk i j
SIG and URL as
j
uid did above. If all checks succeed,
j
uid is also
assured that its communicating counterpart is legitimate.
j
uid Computes the shared pairwise session key
as
,
( )
j
I
j I
r
r
r r
K g = .
j
uid Finally replies
I
uid
,
1 2
, , ( , , , ).
j
I I I
r r
j I
r
r r r
K
g g E g g ts ts = ( .3) M
Upon receipt of ( .3) M
, and( .2) M