A Secure Hybrid P2P Network Mobile Communication Device Design

Article Preview

Abstract:

Wireless Networkinfrastructure has Developed Rapidly with the Popularity of Personal Mobiledevices. Userscan Use Mobile Devices to Roam the Wireless Network Environment Conductingtransactions such as Sending Messages and Accessing the Internet. Networkcommunication has Become a Lifestyle Necessity. the Application of Information Technologyproducts also Brings IT Security Issues. the Wireless Network Environment Makesmessages Susceptible to Eavesdropping and Data Tampering Attacks. in Addition,the Mobile Device Computation Ability Presents Power Limiting Issues. Therefore,achieving Efficiency and Security Requirements is more Difficult in Mobiledevice Data Transfer over a Wireless Network Compared with a Hard-Wiredcomputer Network. Insecurity Issues Abound in Peer to Peer (P2P) Networks.Conducting Identity Authentication Recognized Certified Legal Membership Andperforming Message Delivery and Shared Information are Critical Issues. Theidentity (ID) Authentication and Certification for this Type of Network Hasbecome an Important Issue. the Paperpresents a Secure Communication Method Using Self-Certified Sign-Cryption Witha Blind Signature Scheme Based on Elliptic Curve Cryptography (ECC) Forhybrid P2P Networks. Theoreticalanalysis Shows Better Secure Identification-and-Authentication Features.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

968-972

Citation:

Online since:

December 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Chien-Hua Tsai, Pin-Chang Su, Incorporating Robust Authentication Scheme in P2P E-Commerce Applications, Journal of e-Business, Vol. 14, (2012) 597-618.

Google Scholar

[2] Chou, C.C., Wei, S.L., Kuo, C.C., and Naik, K., An Efficient Anonymous Communication Protocol for Peer-to-Peer Applications over Mobile ad-hoc Networks, IEEE Journal on selected areas in communications, 25(1), (2007)192- 203.

DOI: 10.1109/jsac.2007.070119

Google Scholar

[3] M. Girault, Self-certified public keys, Advances in Cryptology-Euro, Vol. 547, Spring-Verlag, (1991) 491-497.

Google Scholar

[4] D. Chaum, Blind signatures system, Advances in Cryptology, CRYPTO'83, (1983) pp.153-156.

Google Scholar

[5] Miller,V. S., Use of Elliptic Curve in Cryptography, Advance in Cryptography - Crypto '85, New York: Spring-Verlag, (1985)417-426.

Google Scholar

[6] N. Koblitz, Elliptic Curve Cryptosystems, Mathematics of Computation American Mathematical Society , V481, (1987) 417-426.

Google Scholar

[7] Fuh-Gwo Jeng, Tzer-Long Chen, Tzer-Shyong Chen, An ECC-Based Blind Signature Scheme, Journal of Networks, Vol. 5, NO. 8, Aug, 2010, pp.921-928.

DOI: 10.1109/tencon.2004.1414519

Google Scholar

[8] YU Hui-Fang, WANG Cai-Fen, WANG Zhi-cang, Self-certified Signcryption Scheme Based on Elliptic Curve , I-I2-WJSJ, (Mar, 2010)Vol. 3.

Google Scholar

[9] Pin-Chang Su, Enhanced short signature scheme with hybrid problems, Computers and Electrical Engineering, Vol. 37, (2011)174-179.

DOI: 10.1016/j.compeleceng.2011.02.003

Google Scholar