Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A public-key based authentication and key establishment protocol coupled with a client puzzle
Journal of the American Society for Information Science and Technology
Mitigating Denial of Service Attacks with Password Puzzles
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02
Efficient authenticated key agreement protocols resistant to a denial-of-service attack
International Journal of Network Management
Energy-efficient and scalable group key agreement for large ad hoc networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols
IEEE Transactions on Mobile Computing
An Optimal Round Two-Party Password-Authenticated Key Agreement Protocol
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Low-power group key agreement for heterogeneous wireless networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
How public key cryptography influences wireless sensor node lifetime
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
The energy cost of cryptographic key establishment in wireless sensor networks
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Secure Password Authentication Protocol in Wireless Networks
NWESP '06 Proceedings of the International Conference on Next Generation Web Services Practices
A denial-of-service resistant public-key authentication and key establishment protocol
PCC '02 Proceedings of the Performance, Computing, and Communications Conference, 2002. on 21st IEEE International
Secure group communications over combined wired and wireless networks
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Password-Based group key exchange in a constant number of rounds
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Provably-Secure two-round password-authenticated group key exchange in the standard model
IWSEC'06 Proceedings of the 1st international conference on Security
Constant-Round password-based group key generation for multi-layer ad-hoc networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
A Cluster-Based Framework for the Security of Medical Sensor Environments
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
Hi-index | 0.00 |
Wireless networks are very convenient as they allow mobile users to be connected whenever and wherever they desire. Group key agreement (GKA) protocols are used in these networks to allow secure group communications among the wireless nodes. Password-based authentication for GKA protocols provide better solutions than digital signature authentication as password-based solutions do not require Public Key Infrastructure and are less computationally intensive. However, GKA protocols, including password-based GKA protocols, are susceptible to Denial-of-Service(DoS) attacks that can disrupt GKA services, and most current GKA protocols, including password-based GKA protocols, do not provide protection against DoS attacks. Besides DoS attacks, password-based GKA protocols are also susceptible to on-line and off-line password guessing attacks. Currently, most password-based GKA protocols are secure only against off-line password guessing attacks. In this paper, we present an authenticated password-based GKA protocol that provides protection against DoS attacks and is secure against both on-line and off-line password guessing attacks. Our proposed protocol, which uses a hierarchical group model, also provides key confirmation and is energy efficient and scalable. Unlike current communication energy analysis that combine energy costs for point-to-point (P2P) and broadcast communications (transmission and reception) together, our communication energy analysis separates P2P and broadcast communications to provide more detailed study on communications in GKA. Both the complexity analysis and energy costs analysis of the proposed protocol with two other password-based GKA schemes show that our proposed protocol is more efficient and suitable for wireless networks.