Non-interactive Identity-based Underwater data transmission with Anonymity and Zero-knowledge

Changsheng Wan, Vir Phoha, Yuzhe Tang, Aiqun Hu

Research output: Contribution to journalArticle

Abstract

Due to the lack of security infrastructures, data transmission protocols for underwater wireless communications have to use identity-based cryptography for protecting the transmitted data. However, current identity-based cryptographic schemes need to transmit vehicles' real identities along with messages. Once adversaries can get real identities of vehicles, they will be able to collect information of underwater vehicles, track them and establish attacks on them. Moreover, during data transmission, adversaries will be able to count underwater vehicles and evaluate the enemy's scale. At the same time, due to the complicated underwater environment, transmitted messages will easily be lost. Therefore, non-interactive data transmission is desired, where underwater vehicles do not need transmit additional messages for authentication and key establishment. To address these issues, we present two novel non-interactive identity-based data transmission protocols. Similar to the protocols of this field, our protocols can provide integrity and confidentiality protections for transmitted messages. However, compared to other well-known approaches, our protocols do not expose any information of vehicles' real identities and use different identities for transmitting each message. By doing so, adversaries will not be able to collect information of underwater vehicles, track them, and count them. Moreover, in our protocols, underwater vehicles can transmit messages directly, without previously sending authentication and key establishment messages, namely our protocols can achieve the non-interactivity goal. In addition, one of our protocol even permits vehicles transmitting messages without knowing any information of each other. Therefore, our protocol is quite suitable for underwater environment. Experimental results show that the proposed protocol is feasible for real-world applications.

Original languageEnglish (US)
JournalIEEE Transactions on Vehicular Technology
DOIs
StateAccepted/In press - Sep 27 2017

Fingerprint

Zero-knowledge
Identity-based
Anonymity
Data Transmission
Data communication systems
Underwater Vehicle
Authentication
Count
Identity-based Cryptography
Confidentiality
Real-world Applications
Cryptography
Wireless Communication
Integrity
Infrastructure
Attack
Communication

Keywords

  • Anonymity
  • Identitybased data transmission
  • Noninteractivity
  • underwater wireless communications
  • Zero-knowledge

ASJC Scopus subject areas

  • Automotive Engineering
  • Aerospace Engineering
  • Applied Mathematics
  • Electrical and Electronic Engineering

Cite this

@article{dd5dc4dc9d934399810d464934ca7164,
title = "Non-interactive Identity-based Underwater data transmission with Anonymity and Zero-knowledge",
abstract = "Due to the lack of security infrastructures, data transmission protocols for underwater wireless communications have to use identity-based cryptography for protecting the transmitted data. However, current identity-based cryptographic schemes need to transmit vehicles' real identities along with messages. Once adversaries can get real identities of vehicles, they will be able to collect information of underwater vehicles, track them and establish attacks on them. Moreover, during data transmission, adversaries will be able to count underwater vehicles and evaluate the enemy's scale. At the same time, due to the complicated underwater environment, transmitted messages will easily be lost. Therefore, non-interactive data transmission is desired, where underwater vehicles do not need transmit additional messages for authentication and key establishment. To address these issues, we present two novel non-interactive identity-based data transmission protocols. Similar to the protocols of this field, our protocols can provide integrity and confidentiality protections for transmitted messages. However, compared to other well-known approaches, our protocols do not expose any information of vehicles' real identities and use different identities for transmitting each message. By doing so, adversaries will not be able to collect information of underwater vehicles, track them, and count them. Moreover, in our protocols, underwater vehicles can transmit messages directly, without previously sending authentication and key establishment messages, namely our protocols can achieve the non-interactivity goal. In addition, one of our protocol even permits vehicles transmitting messages without knowing any information of each other. Therefore, our protocol is quite suitable for underwater environment. Experimental results show that the proposed protocol is feasible for real-world applications.",
keywords = "Anonymity, Identitybased data transmission, Noninteractivity, underwater wireless communications, Zero-knowledge",
author = "Changsheng Wan and Vir Phoha and Yuzhe Tang and Aiqun Hu",
year = "2017",
month = "9",
day = "27",
doi = "10.1109/TVT.2017.2757500",
language = "English (US)",
journal = "IEEE Transactions on Vehicular Technology",
issn = "0018-9545",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - JOUR

T1 - Non-interactive Identity-based Underwater data transmission with Anonymity and Zero-knowledge

AU - Wan, Changsheng

AU - Phoha, Vir

AU - Tang, Yuzhe

AU - Hu, Aiqun

PY - 2017/9/27

Y1 - 2017/9/27

N2 - Due to the lack of security infrastructures, data transmission protocols for underwater wireless communications have to use identity-based cryptography for protecting the transmitted data. However, current identity-based cryptographic schemes need to transmit vehicles' real identities along with messages. Once adversaries can get real identities of vehicles, they will be able to collect information of underwater vehicles, track them and establish attacks on them. Moreover, during data transmission, adversaries will be able to count underwater vehicles and evaluate the enemy's scale. At the same time, due to the complicated underwater environment, transmitted messages will easily be lost. Therefore, non-interactive data transmission is desired, where underwater vehicles do not need transmit additional messages for authentication and key establishment. To address these issues, we present two novel non-interactive identity-based data transmission protocols. Similar to the protocols of this field, our protocols can provide integrity and confidentiality protections for transmitted messages. However, compared to other well-known approaches, our protocols do not expose any information of vehicles' real identities and use different identities for transmitting each message. By doing so, adversaries will not be able to collect information of underwater vehicles, track them, and count them. Moreover, in our protocols, underwater vehicles can transmit messages directly, without previously sending authentication and key establishment messages, namely our protocols can achieve the non-interactivity goal. In addition, one of our protocol even permits vehicles transmitting messages without knowing any information of each other. Therefore, our protocol is quite suitable for underwater environment. Experimental results show that the proposed protocol is feasible for real-world applications.

AB - Due to the lack of security infrastructures, data transmission protocols for underwater wireless communications have to use identity-based cryptography for protecting the transmitted data. However, current identity-based cryptographic schemes need to transmit vehicles' real identities along with messages. Once adversaries can get real identities of vehicles, they will be able to collect information of underwater vehicles, track them and establish attacks on them. Moreover, during data transmission, adversaries will be able to count underwater vehicles and evaluate the enemy's scale. At the same time, due to the complicated underwater environment, transmitted messages will easily be lost. Therefore, non-interactive data transmission is desired, where underwater vehicles do not need transmit additional messages for authentication and key establishment. To address these issues, we present two novel non-interactive identity-based data transmission protocols. Similar to the protocols of this field, our protocols can provide integrity and confidentiality protections for transmitted messages. However, compared to other well-known approaches, our protocols do not expose any information of vehicles' real identities and use different identities for transmitting each message. By doing so, adversaries will not be able to collect information of underwater vehicles, track them, and count them. Moreover, in our protocols, underwater vehicles can transmit messages directly, without previously sending authentication and key establishment messages, namely our protocols can achieve the non-interactivity goal. In addition, one of our protocol even permits vehicles transmitting messages without knowing any information of each other. Therefore, our protocol is quite suitable for underwater environment. Experimental results show that the proposed protocol is feasible for real-world applications.

KW - Anonymity

KW - Identitybased data transmission

KW - Noninteractivity

KW - underwater wireless communications

KW - Zero-knowledge

UR - http://www.scopus.com/inward/record.url?scp=85030683319&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85030683319&partnerID=8YFLogxK

U2 - 10.1109/TVT.2017.2757500

DO - 10.1109/TVT.2017.2757500

M3 - Article

JO - IEEE Transactions on Vehicular Technology

JF - IEEE Transactions on Vehicular Technology

SN - 0018-9545

ER -