Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Multicluster, mobile, multimedia radio network
Wireless Networks
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Efficient and Secure Conference-Key Distribution
Proceedings of the International Workshop on Security Protocols
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Tree-based group key agreement
ACM Transactions on Information and System Security (TISSEC)
Cluster-based Group Key Agreement for Wireless Ad hoc Networks
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
A Clustering-based Group Key Agreement Protocol for Ad-Hoc Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
A secure and scalable Group Key Exchange system
Information Processing Letters
Dynamic group key agreement in tree-based setting
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Constant round dynamic group key agreement
ISC'05 Proceedings of the 8th international conference on Information Security
Authenticated and communication efficient group key agreement for clustered ad hoc networks
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting
IEEE Transactions on Information Theory
A privacy-preserving ID-based group key agreement scheme applied in VPAN
SOFSEM'11 Proceedings of the 37th international conference on Current trends in theory and practice of computer science
Security improvement on a group key exchange protocol for mobile networks
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part IV
Group key agreement for secure group communication in dynamic peer systems
Journal of Parallel and Distributed Computing
Hi-index | 0.00 |
Ad hoc wireless networks offer anytime-anywhere networking services for infrastructure-free communication over the shared wireless medium. The proliferation of portable devices and ad hoc networks have led to the need for security services. This is illustrated daily in the media with reports of wireless network vulnerabilities. In this setting, secure group key agreement and efficient group key management are considered challenging tasks from both an algorithmic and computational point of view due to resource constraint in wireless networks. In this article, we present two dynamically efficient authenticated group key agreement protocols by reflecting ad hoc networks in a topology composed by a set of clusters. We analyse the complexity of the schemes and differentiate between the two approaches based on performance in a wireless setting. The proposed protocols avoid the use of a trusted third party (TTP) or a central authority, eliminating a single point attack. They allow easy addition and removal of nodes, and achieve better performance in comparison with the existing cluster based key agreements. Additionally, our proposed schemes are supported by sound security analysis in formal security models under standard cryptographic assumptions.