CFP last date
20 January 2025
Reseach Article

Exponentiated Multiple Message Communication using Certificateless Signcryption for Mobile Network Security

by Sumithra Alagarsamy, S. P. Rajagopalan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 7
Year of Publication: 2017
Authors: Sumithra Alagarsamy, S. P. Rajagopalan
10.5120/ijca2017915705

Sumithra Alagarsamy, S. P. Rajagopalan . Exponentiated Multiple Message Communication using Certificateless Signcryption for Mobile Network Security. International Journal of Computer Applications. 178, 7 ( Nov 2017), 13-24. DOI=10.5120/ijca2017915705

@article{ 10.5120/ijca2017915705,
author = { Sumithra Alagarsamy, S. P. Rajagopalan },
title = { Exponentiated Multiple Message Communication using Certificateless Signcryption for Mobile Network Security },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2017 },
volume = { 178 },
number = { 7 },
month = { Nov },
year = { 2017 },
issn = { 0975-8887 },
pages = { 13-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number7/28692-2017915705/ },
doi = { 10.5120/ijca2017915705 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:49:45.361214+05:30
%A Sumithra Alagarsamy
%A S. P. Rajagopalan
%T Exponentiated Multiple Message Communication using Certificateless Signcryption for Mobile Network Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 7
%P 13-24
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The rapid progress in the internet requires multiple message communication over the wider area to improve the mobile network security. Due to the multiple message communication, the security is a most important concern in mobile network. The bilinear Certificate less Aggregate Signcryption Scheme guarantees the security under several attacks, and therefore provides security and non-repudiation. However, the multiple messages through a single operation are a difficult task to improve the network security. In addition, multilinear map based signcryption scheme provides the confidentiality and authenticity but it is complicated for handling when number of messages gets increased rapidly. In order to overcome the problem in multiple message communication, Exponentiated Multilinear Vectorized Certificateless Signcryption (EMV-CLSC) technique is introduced. The EMV-CLSC technique is used to verify the multiple messages through a single Signcryption process. An efficient certificate less signcryption technique performs the multiple message communication between senders andreceiver to ensure the network security. In EMV-CLSC, the multilinear vectorized model is applied for handling the high volume of data and multiple data format while distributing the message simultaneously. This helps to reduce the memory consumption while processing the multiple data. The proposed EMV-CLSC technique provably improves the security with public key verifiability and cipher text authenticity. Based on, the authorized users only access the network and the messages are protected. At last, the Broadcast message is secured using Digital Signature verification in uncsigncryption process. A certificate less signcryption process with multiple bits is used to highly secure the multiple messages using EMV-CLSC technique. This helps to protect the messages against the attacks and improve the mobile network security. An experimental result shows that the proposed EMV-CLSC technique improves the network security in terms of computational cost, memory consumption, communication overhead and secured message distributing rate compared to the state-of-the-art works.

References
  1. Fagen Li, and Jiaojiao Hong, “Efficient Certificateless Access Control for Wireless Body Area Networks”, IEEE Sensors Journal, Volume 16, Issue 13, July 2016, Pages 5389- 5396
  2. Han Yiliang and Chen Fei, “The Multilinear maps based Certificateless Aggregate Signcryption Scheme”, International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015, Pages 92 -99
  3. Hasen Nicanfar, Paria Jokar, Konstantin Beznosov, and Victor C. M. Leung, “Efficient Authentication and Key Management Mechanisms for Smart Grid Communications”, IEEE Systems Journal, Volume 8, Issue 2, June 2014, Pages 629 – 640
  4. Yi-Pin Liao , Chih-Ming Hsiao, “A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol”, Ad Hoc Networks, Elsevier, Volume 18, July 2014, Pages 133–146
  5. Ye Tian, Yanbin Peng,Xinguang Peng, and Hongbin Li, “An Attribute-Based Encryption Scheme with Revocation for Fine-Grained Access Control in Wireless Body Area Networks”, International Journal of Distributed Sensor Networks, Hindawi Publishing Corporation, Volume 2014, November 2014, Pages 1-9
  6. Nai-Wei Lo and Jia-Lun Tsai, “A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings”, Journal of Applied Mathematics, Hindawi Publishing Corporation, Volume 2014, pages 1-10
  7. Rawya Rizk, Yasmin Alkady, “Two-phase hybrid cryptography algorithm for wireless sensor networks”, Journal of Electrical Systems and Information Technology, volume 2, 2015, Pages 296–313
  8. Chunqiang Hu, Nan Zhang, Hongjuan Li, Xiuzhen Cheng, and Xiaofeng Liao, “Body area network security: a fuzzy attribute-based signcryption scheme”, IEEE Journal on Selected Areas in Communications/Supplement, Volume 31, Issue 9, 2013, Pages 37–45
  9. S.Padma, D.C. Joy Winnie Wise, S. Malaiarasan, N. Rajapriya, “Ensuring Authenticity and Revocability for Wireless Body Area Network using Certificateless Cryptography”, International Research Journal of Engineering and Technology (IRJET), Volume 03 Issue 03, March 2016, Pages 171-1715,
  10. Kanaga Suba Raja, Usha Kiruthika, “An Energy Efficient Method for Secure and Reliable Data Transmission in Wireless Body Area Networks Using RelAODV”, Wireless Personal Communications, Springer, Volume 83, Issue 4, 2015, Pages 2975–2997,
  11. Madhumita Panda, “Security in Wireless Sensor Networks using Cryptographic Techniques”, American Journal of Engineering Research (AJER), Volume 03, Issue 01, 2014, Pages 50-56
  12. Zhongyuan Qin, Xinshuai Zhang, Kerong Feng, Qunfang Zhang, and Jie Huang,” An Efficient Key Management Scheme Based on ECC and AVL Tree for Large Scale Wireless Sensor Networks”, Hindawi Publishing Corporation International Journal of Distributed Sensor Networks, Volume 2015, August 2015, Pages 1- 7
  13. Krishna Kumar Pandey, Vikas Rangari, Sitesh KumarSinha, “An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security”, International Journal of Computer Applications, Volume 74, Issue 20, July 2013, Pages 0975 – 8887
  14. Yang Lu and Jiguo Li, “Efficient Certificate-Based Signcryption Secure against PublicKey Replacement Attacks and Insider Attacks”, the Scientific World Journal, Hindawi Publishing Corporation, Volume 2014, May 2014, Pages 1-12
  15. Shyam Nandan Kumar, “Review on Network Security and Cryptography”, International Transaction of Electrical and Computer Engineers System, Volume 3, Issue 1, 2015, Pages 1-11
  16. SK Hafizul Islam and G.P. Biswas, “Certificateless short sequential and broadcast multi signature schemes using elliptic curve bilinear pairings”, Journal of King Saud University – Computer and Information Sciences, Elsevier, Volume 26, 2014, Pages 89–97
  17. Charru, Paramjeet Singh, Shaveta Rani, “Improved Cryptography Algorithm to Enhanced Data Security”, International Journal For Research in Applied Science and engineering technology (IJRASET) , Volume 2, Issue IX, September 2014, Pages 242-247
  18. Madhusanka Liyanage ,Ahmed Bux Abro ,Mika Ylianttila and Andrei Gurtov, “Opportunities and Challenges of Software-Defined Mobile Networks in Network Security”, IEEE Security & Privacy, Volume 14, Issue 4, 2016, Pages 34 – 44.
  19. Wei Liu , Hiroki Nishiyama, Nirwan Ansari , Jie Yang , Nei Kato, “Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks”, IEEE Transactions on Parallel and Distributed Systems , Volume 24, Issue 2, February 2013, Pages 239 – 249
  20. Jian Shen, Haowen Tan, Sangman Moh, Ilyong Chung, Qi Liu, and Xingming Sun, “Enhanced Secure Sensor Association and Key Management in Wireless Body Area Networks”, Journal Of Communications And Networks, Volume 17, Issue 5, October 2015, Pages 453-462.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile network security Certificateless scheme Signcryption Multilinear vectorized model multiple message communication signature verification.