Communication complexity of group key distribution
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
A Reliable Multicast Algorithm for Mobile Ad Hoc Networks
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
Tree-based group key agreement
ACM Transactions on Information and System Security (TISSEC)
Group Key Agreement Efficient in Communication
IEEE Transactions on Computers
Elliptic and hyperelliptic curves on embedded μP
ACM Transactions on Embedded Computing Systems (TECS)
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups
ICPADS '05 Proceedings of the 11th International Conference on Parallel and Distributed Systems - Workshops - Volume 02
Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
Property-Based Taming of Lying Mobile Nodes
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
Key agreement in ad hoc networks
Computer Communications
Defining trust evidence: research directions
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
A new hierarchical and scalable group key exchange protocol with XOR operation
International Journal of Wireless and Mobile Computing
ASCDS: a smartphone confidential data storage scheme
International Journal of Wireless and Mobile Computing
Hi-index | 0.00 |
Security of various group-oriented applications for mobile ad-hoc groups requires a group secret shared between all participants. Contributory Group Key Agreement (CGKA) protocols can be used in mobile ad-hoc scenarios due to the absence of any trusted central authority (group manager) that actively participates in the computation of the group key. Members of spontaneously formed mobile ad-hoc groups are usually equipped with different kinds of mobile devices with varying performance capabilities. This heterogeneity opens new ways for the design of CGKA protocols and states additional security requirements with regard to the trustworthiness of the devices. In this paper we propose a CGKA protocol for mobile ad hoc groups that fairly distributes the computation costs amongst mobile devices by taking into account their performance limitations and preventing possible cheating through Trusted Computing techniques.