Dynamic participation in a secure conference scheme for mobile communications

被引:38
|
作者
Hwang, MS [1 ]
机构
[1] Chaoyang Univ Technol, Dept Informat Management, Wufeng, Taiwan
关键词
cryptography; mobile communications; security; teleconference;
D O I
10.1109/25.790522
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a scheme to implement secure digital mobile communications. The scheme can both enable multiple users to hold a secure teleconference and also resolve the problem of allowing a participant to join dynamically or to quit a teleconference already in progress. Essentially, teleconference is a synchronous collaboration session in which participants at remote locations cooperate through wireless communications. Two requirements for the system are: privacy and authentication. Privacy signifies that an eavesdropper cannot intercept conversations of a conference. Authentication ensures that the service is not obtained fraudulently in order to avoid usage charge usage. We present a conference key distribution scheme for digital mobile communications, according to which users can share a common secret key to hold a secure teleconference over a public channel. The participants need not alter their secret information when a participant joins late or quits the conference early.
引用
收藏
页码:1469 / 1474
页数:6
相关论文
共 50 条
  • [21] KTDCKM-SDC: A distributed conference key management scheme for Secure Dynamic conferencing
    Adusumilli, P
    Zou, XK
    10TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2005, : 476 - 481
  • [22] New Scheme to Secure Mobile Agent
    Amrani, Ayoub
    Rafalia, Najat
    Jaafar, Abouchabaka
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT: A 2025 VISION TO SUSTAIN ECONOMIC DEVELOPMENT DURING GLOBAL CHALLENGES, 2020, : 9855 - 9862
  • [23] Instant Secure Mobile Payment Scheme
    Obaid, Mahmoud
    Bayram, Zeki
    Saleh, Murad
    IEEE ACCESS, 2019, 7 : 55669 - 55678
  • [24] Low-latency secure mobile communications
    Choyi, VK
    Barbeau, M
    WiMob'2005: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Vol 2, Proceedings: MOBILE NETWORKING, 2005, : 38 - 43
  • [25] Secure hashing of the NEMO mobile router communications
    Tan, TK
    Samsudin, A
    2005 13th IEEE International Conference on Networks Jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings 1 and 2, 2005, : 341 - 345
  • [26] Secure key distribution protocol in mobile communications
    Yang, Hyungkyu
    An, YoungHwa
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 152 - 155
  • [27] Mobile Secure Communications in Smart Grid Control
    Dondossola, Giovanna
    Terruggia, Roberta
    SMART GRID INSPIRED FUTURE TECHNOLOGIES, 2017, 203 : 182 - 191
  • [28] Secure ICT services for mobile and wireless communications
    Siddiqi, J.
    Akhgar, B.
    Naderi, M.
    Orth, W.
    Meyer, N.
    Tuisku, M.
    Pipan, G.
    Lopez Gallego, M.
    Garciáa, J.A.
    Cecchi, M.
    International Journal of Mobile Communications, 2007, 5 (05) : 572 - 589
  • [29] A Novel Architecture for Secure Communications in Mobile Systems
    Upadhya, Alok
    Sahoo, Jajati Keshari
    Bajpai, Vibhor
    2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 801 - 805
  • [30] A study of secure communications between mobile objects
    Liao, ZG
    Li, ZZ
    Yan, C
    Tao, Z
    ICECCS 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2005, : 377 - 383