A three round authenticated group key agreement protocol for ad hoc networks

被引:12
|
作者
Augot, Daniel [1 ]
Bhaskar, Raghav [1 ]
Issarny, Valerie [2 ]
Sacchetti, Daniele [2 ]
机构
[1] INRIA Rocquencourt, Projet CODES, F-78153 Le Chesnay, France
[2] INRIA Rocquencourt, Projet ARLES, F-78153 Le Chesnay, France
关键词
Key agreement; Ad hoc networks; Provable security; Cryptographic protocols;
D O I
10.1016/j.pmcj.2006.07.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also provide efficient ways to change the key when the participants change. While some of the proposed GKA protocols are too resource consuming for the constraint devices often present in ad hoc networks, others lack a formal security analysis. In this paper, we propose a simple, efficient and secure GKA protocol well-suited to ad hoc networks and present results of our implementation of the same in a prototype application. (C) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:36 / 52
页数:17
相关论文
共 50 条
  • [41] Key agreement in ad hoc networks
    Asokan, N
    Ginzboorg, P
    COMPUTER COMMUNICATIONS, 2000, 23 (17) : 1627 - 1637
  • [42] Efficient ID-Based One Round Authenticated Group Key Agreement Protocol
    Shi, Yijuan
    Chen, Gongliang
    Li, Jianhua
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (03): : 167 - 170
  • [43] Efficient ID-based Two Round Authenticated Group Key Agreement Protocol
    Tang Hong
    Zhu Liehuang
    Zhang Zijian
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4924 - 4927
  • [44] An authenticated 3-round identity-based group key agreement protocol
    Yao, Gang
    Wang, Hongji
    Jiang, Qingshan
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 538 - +
  • [45] An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks
    Ma, Mimi
    He, Debiao
    Wang, Huaqun
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 8065 - 8075
  • [46] A communication-efficient key agreement protocol in Ad hoc Networks
    Shi, HS
    He, MX
    2005 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, COMMUNICATIONS AND MOBILE COMPUTING, VOLS 1 AND 2, 2005, : 285 - 291
  • [47] Efficient hybrid key agreement protocol for wireless ad hoc networks
    Li, XY
    Wang, Y
    Frieder, O
    ELEVENTH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2002, : 404 - 409
  • [48] An Authenticated Constant Round Group Key Agreement Protocol Based on Elliptic Curve Cryptography
    Zhu Liehuang
    Liao Lejian
    Li Wenzhuo
    Zhang Zijian
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (8B): : 131 - 134
  • [49] A Layer-Cluster Key Agreement Protocol for Ad Hoc Networks
    章丽平
    崔国华
    雷建云
    许静芳
    卢社阶
    Journal of Southwest Jiaotong University(English Edition), 2008, (04) : 346 - 351
  • [50] Efficient Key Tree Construction for Group Key Agreement in Ad Hoc Networks
    Wan, Zhiguo
    Zhu, Bo
    Deng, Robert H.
    Bao, Feng
    Ananda, Akkihebbal L.
    2006 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2006), VOLS 1-4, 2006, : 652 - 658