Secure device-to-device authentication in mobile multi-hop networks

Hyunsoo Kwon, Changhee Hahn, Daeyoung Kim, Kyungtae Kang, Junbeom Hur

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Citations (Scopus)


In order to deal with drastically increasing mobile traffic these days, device to device connection (D2D) which provides infra-connection’s off-loading is getting a lot of attention. However, we observed that most of the currentD2Dprotocols such as Bluetooth and Wi-FiDirect are not scalable, and vulnerable to main-in-the-middle (MITM) and replay attacks in mobile multi-hop networks. In this paper, we propose novel D2D authentication protocols with a secure initial key establishment using ciphertextpolicy attribute-based encryption(CP-ABE) to solve this problem. By exploiting CP-ABE, the proposed scheme allows the communicating parties to mutually authenticate each other and derive the link key in an expressive and secure way in themulti-hop network environment. According to the analysis results, the proposed scheme is secure against MITM and replay attacks in the D2D mobile multi-hop networks.

Original languageEnglish
Title of host publicationWireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings
EditorsZhipeng Cai, Chaokun Wang, Siyao Cheng, Hongzhi Wang, Hong Gao
PublisherSpringer Verlag
Number of pages12
ISBN (Electronic)9783319077819
Publication statusPublished - 2014
Externally publishedYes
Event9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014 - Harbin, China
Duration: 2014 Jun 232014 Jun 25

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)


Dive into the research topics of 'Secure device-to-device authentication in mobile multi-hop networks'. Together they form a unique fingerprint.

Cite this