An authenticated clustering-based group key agreement for large ad hoc networks

被引:0
|
作者
Information Security Center, Beijing University of Posts and Telecommunications, Beijing, China [1 ]
不详 [2 ]
机构
[1] Information Security Center, Beijing University of Posts and Telecommunications, Beijing
[2] Naval Academy of Armament, Beijing
来源
Adv. Inf. Sci. Serv. Sci. | 2012年 / 7卷 / 281-291期
关键词
Ad hoc networks; Authenticated group key agreement; Clustering; Spanning tree;
D O I
10.4156/AISS.vol4.issue7.33
中图分类号
学科分类号
摘要
Group key agreement protocols for wired networks are not applicable in ad hoc networks because of the 1-hop assumption of these protocols and the dynamic, multi-hop attributes of ad hoc networks. An authenticated group key agreement for ad hoc networks is proposed which arranges the group members in a cluster-based hierarchical spanning tree structure. The scheme uses Intra-cluster group key agreement (IC-GKA) to get the cluster key and arbitrary topology generalization of Diffie-Hellman (AT-GDH) to compute the final group key. BLS short signature algorithm (reducing the message size) is adopted to authenticate the messages exchanged during the protocol execution. The protocol can handle the dynamic membership changes in ad hoc networks. By security analysis of AT-GDH for the first time, the paper proves the semantic security of our proposed protocol. Complexity analysis shows that our protocol is suitable for ad hoc networks with large size.
引用
收藏
页码:281 / 291
页数:10
相关论文
共 50 条
  • [1] Provable security efficient clustering-based group key agreement for ad hoc networks
    Hao, Bin
    Yang, Yu
    Luo, Shoushan
    Yang, Yixian
    International Journal of Advancements in Computing Technology, 2012, 4 (07) : 317 - 328
  • [2] A Clustering-based Group Key Agreement Protocol for Ad-Hoc Networks
    Hietalahti, Maarit
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 192 (02) : 43 - 53
  • [3] Authenticated and communication efficient group key agreement for clustered ad hoc networks
    Shi, Hongsong
    He, Mingxing
    Qin, Zhiguang
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 73 - +
  • [4] A three round authenticated group key agreement protocol for ad hoc networks
    Augot, Daniel
    Bhaskar, Raghav
    Issarny, Valerie
    Sacchetti, Daniele
    PERVASIVE AND MOBILE COMPUTING, 2007, 3 (01) : 36 - 52
  • [5] A Clustering-based Scalable Key Management Protocol for Ad Hoc Networks
    Maghmoumi, Chadi
    Abouaissa, Hafid
    Gaber, Jaafar
    Lorenz, Pascal
    2009 SECOND INTERNATIONAL CONFERENCE ON COMMUNICATION THEORY, RELIABILITY, AND QUALITY OF SERVICE, 2009, : 42 - +
  • [6] A Password-authenticated Key Agreement Scheme for Ad hoc Networks
    Hu Ronglei
    Chi Yaping
    Xu Fenglin
    Wei Zhanzhen
    Li Ran
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2943 - 2947
  • [7] A Novel Group Key Agreement Protocol for Ad Hoc Networks
    Zhang Li-Ping
    Wang Yi
    Li Gui-Ling
    2009 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2009), 2009, : 509 - +
  • [8] Dynamic asymmetric group key agreement for ad hoc networks
    Zhao, Xingwen
    Zhang, Fangguo
    Tian, Haibo
    AD HOC NETWORKS, 2011, 9 (05) : 928 - 939
  • [9] An Efficient Group Key Agreement Protocol for Ad Hoc Networks
    Zhang Li-Ping
    Cui Guo-Hua
    Yu Zhi-Gang
    PROCEEDINGS OF THE 2008 7TH IEEE INTERNATIONAL CONFERENCE ON CYBERNETIC INTELLIGENT SYSTEMS, 2008, : 180 - +
  • [10] A Secure and Efficient Group Key Agreement for Ad hoc Networks
    Feng, Tao
    Wang, Yilin
    Ma, Jianfeng
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 540 - +