A secure verifiable key agreement protocol for mobile conferencing

被引:0
|
作者
Saha, Mounita [1 ]
RoyChowdhury, Dipanwita [1 ]
Sengupta, Indranil [1 ]
机构
[1] Indian Inst Technol, Dept CSE, Kharagpur, W Bengal, India
关键词
key agreement protocols; authentication; mobile teleconference;
D O I
10.1109/COMSWA.2008.4554412
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A growing application area in wireless communications is mobile teleconference. However, wireless communication are more susceptible to eavesdropping and unauthorized access than the wired communication. It is therefore crucial to build secure conference scheme for such communication. In this work, propose a true conference key agreement scheme which addresses some security issues not considered in previous works on conference key schemes. In the proposed protocol, the users can verify the utilization of their share in key construction. Also, the scheme is forward secure, provides mutual authentication and secure dynamic joining and leaving. The protocol is shown to be resistant against replay and impersonation attacks.
引用
收藏
页码:219 / 222
页数:4
相关论文
共 50 条
  • [31] A provably secure authenticated key agreement protocol for wireless communications
    Guo, Hua
    Xu, Chang
    Mu, Yi
    Li, Zhoujun
    COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (03) : 563 - 572
  • [32] Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET
    Wei, Guoheng
    Qin, Yanlin
    Fu, Wei
    EMERGING INFORMATION SECURITY AND APPLICATIONS, EISA 2022, 2022, 1641 : 160 - 172
  • [33] The software architecture of a secure and efficient group key agreement protocol
    Hong, Sunghyuck
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 274 - 278
  • [34] ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN
    Javad Alizadeh
    Masoumeh Safkhani
    Amir Allahdadi
    Wireless Personal Communications, 2022, 126 : 2911 - 2935
  • [35] A secure authenticated key agreement protocol for application at digital certificat
    Saadatmandan, Javad
    Rahimi, Amirhossein
    International Journal of Network Security, 2020, 22 (02) : 250 - 256
  • [36] An improved Secure Authenticated Group Key Agreement Protocol for WMNs
    Jin, Zhen-Ai
    Park, Geum-Dal
    Yoo, Kee-Young
    ALPIT 2008: SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED LANGUAGE PROCESSING AND WEB INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 412 - +
  • [37] ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN
    Alizadeh, Javad
    Safkhani, Masoumeh
    Allahdadi, Amir
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (04) : 2911 - 2935
  • [38] An Improved Secure Certificateless Authenticated Group Key Agreement Protocol
    Geng, Manman
    Zhang, Futai
    2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTELLIGENT SYSTEMS, PROCEEDINGS, VOL 3, 2009, : 337 - 341
  • [39] Highly secure authentication and key agreement protocol for the internet of vehicles
    Li, Li
    Fan, Xingjuan
    Zhi, Boyuan
    Li, Shaojun
    Dabollahi, Seyyed Amirreza
    TELECOMMUNICATION SYSTEMS, 2024, 87 (01) : 73 - 88
  • [40] Verifiable three-party secure key exchange protocol based on eigenvalue
    Zhang Y.
    Wang Z.
    Wang Z.
    Chen H.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (12): : 149 - 154