A Conference Key Agreement Protocol for Mobile Environment

被引:0
|
作者
Saha, Mounita [1 ]
Chowdhury, Dipanwita Roy [1 ]
机构
[1] Indian Inst Technol Kharagpur, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
来源
JOURNAL OF INFORMATION ASSURANCE AND SECURITY | 2009年 / 4卷 / 01期
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent times, the popularity of group oriented applications such as electronic conferences and collaboration works have increased manifold. Security is crucial for such collaborative applications which operate in a dynamic network environment and communicate over insecure networks such as internet. The design of secure conference key establishment protocol is essential to provide security to such group applications. Most security protocols currently available in the literature are not fully applicable to wireless environment involving low power mobile devices. Few protocols that have been proposed for wireless environment also lack important security properties and formal proof. One such important property is truly contributory key agreement that has not been addressed previously. In this work we propose a new conference key agreement protocol for mobile environment which addresses the truly contributory property and assures users about their participation in the key computation. The design of the protocol is based on polynomial interpolation. We demonstrate that the protocol is provably secure against active adversaries. The performance analysis of the proposed protocol shows that its well suited for mobile environment.
引用
收藏
页码:60 / 68
页数:9
相关论文
共 50 条
  • [31] A 2-pass authentication and key agreement protocol for mobile communications
    Lee, KH
    Moon, SJ
    Jeong, WY
    Kim, TG
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC'99, 2000, 1787 : 156 - 168
  • [32] Novel Untraceable Authenticated Key Agreement Protocol Suitable for Mobile Communication
    Chang, Chin-Chen
    Le, Hai-Duong
    Chang, Ching-Hsiang
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 71 (01) : 425 - 437
  • [33] Group key agreement protocol among mobile devices in different cells
    Kim, Jeeyeon
    Kim, Seungjoo
    Chun, Kilsoo
    Lee, Jaeil
    Won, Dongho
    FRONTIERS OF HIGH PERFORMANCE COMPUTING AND NETWORKING - ISPA 2006 WORKSHOPS, PROCEEDINGS, 2006, 4331 : 1090 - +
  • [34] Analyses authentication and key agreement (AKA) protocol for UMTS mobile networks
    AL-Saraireh, Ja'afer
    Yousef, Sufian
    MOBILE COMPUTING AND WIRELESS COMMUNICATION INTERNATIONAL CONFERENCE, PROCEEDINGS, 2007, : 46 - 50
  • [35] Novel Untraceable Authenticated Key Agreement Protocol Suitable for Mobile Communication
    Chin-Chen Chang
    Hai-Duong Le
    Ching-Hsiang Chang
    Wireless Personal Communications, 2013, 71 : 425 - 437
  • [36] A NEW SESSION KEY AGREEMENT PROTOCOL IN DISTRIBUTED TRUSTED CENTERS ENVIRONMENT
    Li, Ning
    Yeap, Tet
    Yu, Chongxiu
    CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 271 - +
  • [37] A practical and secure fault-tolerant conference-key agreement protocol
    Tzeng, WG
    PUBLIC KEY CRYTOGRAPHY, 2000, 1751 : 1 - 13
  • [38] An ID-based conference key agreement protocol for secure network communications
    Chang, CC
    Lin, IC
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND MANAGEMENT SCIENCES, 2002, 2 : 252 - 256
  • [39] One round identity-based authenticated conference key agreement protocol
    Kim, JS
    Kim, HC
    Ha, KJ
    Yoo, KY
    UNIVERSAL MULTISERVICE NETWORKS, PROCEEDINGS, 2004, 3262 : 407 - 416
  • [40] A new instrusion-tolerant multi-conference-key agreement protocol
    Shi, TJ
    Cheng, XG
    Ma, JF
    ISTM/2005: 6th International Symposium on Test and Measurement, Vols 1-9, Conference Proceedings, 2005, : 8749 - 8752