Implication of Lightweight Cryptographic Primitives for Secure Communication in Various Wireless Networks

  • 普 杉達

Student thesis: Doctoral Thesis


Wireless technology releases us from copper wires A user can have a notebook computer PDA Pocket PC Tablet PC or just a cell phone and stay online anywhere a wireless signal is available The basic theory behind wireless technology is that signals can be carried by electromagnetic waves that are then transmitted to a signal receiver Because of the nature of transmission the communication in the air via various wireless technologies is easier than the traditional wired communication environments However due to the broadcast nature of the wireless channel wireless communication suffers more security threats than the wired one In this regard the attacker may intercept the transmitted message by eavesdropping the wireless channel even the encrypted wireless communication provided Moreover since the communication in every session may be associated with the fixed identity and the static security credentials of the same individual Therefore the attackers may track any individual with wireless devices such as mobile phone RFID tag bio-sensor etc by intercepting its wireless communication In addition to that mobility of the wireless devices such as mobile phones RFID tags incurs possible threat to the past encrypted transmitted data where the past session keys for the encryption of wireless communications may be derived by the long-term secret key of the wireless devices if it was lost or broken On the other hand security (privacy and integrity) of the transmitted data is another imperative concern in wireless communication where an attacker may intercept and try to alter the transmitted data communicated between the wireless devices and that eventually can bring about various security issues By providing the features of anonymity untraceability perfect forward secrecy in the authentication protocols and with the help of an efficient data security mechanism the aforesaid security threats can be dealt in wireless communication Although impressive efforts have been made for accomplishing the security feature such as anonymity however this thesis shows that existing approaches to ensure the property like anonymity are impractical Besides even though some public key crypto-systems such as Differ-Hellman can provide the solution of perfect forward secrecy However most of the existing standards of wireless communication e g global system for mobile communications (GSM) universal mobile telecommunications systems (UMTS) WiFi protected access and etc are based on symmetric-key crypto-system where an asymmetric operation such modular exponential operation causes significantly higher communication overhead and execution time than the symmetric key operations which is greatly imperative for any battery powered wireless devices such as mobile devices RFID tags sensors etc In this thesis at first we show some ways to design the lightweight anonymous authentication framework which can efficiently accomplish the features like anonymity untraceability perfect forward secrecy etc In this regard we use the lightweight cryptographic primitives such as symmetric key encryption/decryption one-way non-collision hash functions and Exclusive-OR operations which are more suitable for battery powered wireless devices In addition to that this thesis also focuses on the data security i e privacy and integrity of the transmitted data communicated between the wireless devices In this context we design some data security frameworks in the form of single-pass authenticated encryption modes (Authencryption) by using the encryption modes such as counter mode cipher feedback mode etc where these conventional modes cannot ensure privacy and integrity of the transmitted data in a single pass Subsequently we enforce our designed lightweight anonymous authentication frameworks and data security frameworks for ensuring security in various wireless networks such as mobile network wireless sensor network etc Furthermore security analyses show that our proposed solutions are secure and hence can be useful for wireless communication
Date of Award2015 Dec 30
Original languageEnglish
SupervisorTzone-Lih Hwang (Supervisor)

Cite this