An authenticated key agreement protocol for mobile ad hoc networks

被引:0
|
作者
Zou, Xukai [1 ]
Thukral, Amandeep [1 ]
Ramamurthy, Byrav [2 ]
机构
[1] Indiana Univ Purdue Univ, Indianapolis, IN 46202 USA
[2] Univ Nebraska, Lincoln, NE 68588 USA
来源
MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS | 2006年 / 4325卷
关键词
network security; Chinese remainder theorem; key management; mobile ad hoc networks; secure group communication;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The growing popularity of wireless ad hoc networks has brought increasing attention to many security issues for such networks. A lot of research has been carried out in the areas of authentication and key management for such networks. However, due to lack of existing standards for such networks, most of the proposed schemes are based on different assumptions and are applicable only in specific environments. Recently Balachandran et al. proposed CRTDH [1], a novel key agreement scheme for group communications in wireless ad hoc networks. The protocol has many desirable properties such as efficient computation of group key and support for high dynamics. However, the protocol does not discuss mutual authentication among the nodes and hence, suffers from two kinds of attacks: man-in-the-middle attack and Least Common Multiple (LCM) attack. This paper identifies the problems with the current CRTDH scheme and discusses these attacks. AUTH-CRTDH, a modified key agreement protocol with authentication capability, is also presented. Results from extensive experiments that were run on the proposed protocol and some other key agreement protocols including CRTDH are also discussed. It can be observed from the experiments that the new scheme is comparable with the CRTDH scheme and better than many other non-authenticated schemes in terms of performance.
引用
收藏
页码:509 / +
页数:3
相关论文
共 50 条
  • [11] Key agreement protocol in ad-hoc networks
    Lang, WH
    Zhou, MT
    She, K
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 296 - 301
  • [12] A New Authenticated Key Agreement Protocol for Wireless Mobile Networks
    Hwang, Shin-Jia
    Chai, Ming-Jhang
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 53 - 56
  • [13] Authenticated and communication efficient group key agreement for clustered ad hoc networks
    Shi, Hongsong
    He, Mingxing
    Qin, Zhiguang
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 73 - +
  • [14] An efficient group key agreement protocol for ad hoc networks
    Augot, D
    Bhaskar, R
    Issarny, V
    Sacchetti, D
    SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS, 2005, : 576 - 580
  • [15] An Efficient Group Key Agreement Protocol for Ad Hoc Networks
    Zhang Li-Ping
    Cui Guo-Hua
    Yu Zhi-Gang
    PROCEEDINGS OF THE 2008 7TH IEEE INTERNATIONAL CONFERENCE ON CYBERNETIC INTELLIGENT SYSTEMS, 2008, : 180 - +
  • [16] An Efficient Group Key Agreement Protocol for Ad Hoc Networks
    Zhang Li-Ping
    Zhang Li-Ping
    Cui Guo-Hua
    Yu Zhi-Gang
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 2509 - +
  • [17] A Novel Group Key Agreement Protocol for Ad Hoc Networks
    Zhang Li-Ping
    Wang Yi
    Li Gui-Ling
    2009 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2009), 2009, : 509 - +
  • [18] A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks
    He, Daojing
    Chen, Chun
    Ma, Maode
    Chan, Sammy
    Bu, Jiajun
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2013, 26 (04) : 495 - 504
  • [19] Real-World Evaluation of an Anonymous Authenticated Key Agreement Protocol for Vehicular Ad-Hoc Networks
    Buettner, Carsten
    Bartels, Friederike
    Huss, Sorin A.
    2015 IEEE 11TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2015, : 651 - 658
  • [20] Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks
    Dang, Lanjun
    Xu, Jie
    Cao, Xuefei
    Li, Hui
    Chen, Jie
    Zhang, Yueyu
    Fu, Xiaotong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (04)