A three round authenticated group key agreement protocol for ad hoc networks

被引:12
|
作者
Augot, Daniel [1 ]
Bhaskar, Raghav [1 ]
Issarny, Valerie [2 ]
Sacchetti, Daniele [2 ]
机构
[1] INRIA Rocquencourt, Projet CODES, F-78153 Le Chesnay, France
[2] INRIA Rocquencourt, Projet ARLES, F-78153 Le Chesnay, France
关键词
Key agreement; Ad hoc networks; Provable security; Cryptographic protocols;
D O I
10.1016/j.pmcj.2006.07.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also provide efficient ways to change the key when the participants change. While some of the proposed GKA protocols are too resource consuming for the constraint devices often present in ad hoc networks, others lack a formal security analysis. In this paper, we propose a simple, efficient and secure GKA protocol well-suited to ad hoc networks and present results of our implementation of the same in a prototype application. (C) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:36 / 52
页数:17
相关论文
共 50 条
  • [31] A Lightweight Group-Key Management Protocol for Ad Hoc Networks
    Miao, Changsheng
    Cao, Fengling
    Chen, Dong
    Chang, Guiran
    2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, : 288 - 291
  • [32] Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks
    Deng, Lunzhi
    Shao, Jianxin
    Hu, Zhenyu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (04) : 2236 - 2247
  • [33] Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks
    Lunzhi Deng
    Jianxin Shao
    Zhenyu Hu
    Peer-to-Peer Networking and Applications, 2021, 14 : 2236 - 2247
  • [34] Provably secure one-round certificateless authenticated group key agreement protocol for secure communications
    SK Hafizul Islam
    Abhishek Singh
    Wireless Personal Communications, 2015, 85 : 879 - 898
  • [35] Provably secure one-round certificateless authenticated group key agreement protocol for secure communications
    Islam, S. K. Hafizul
    Singh, Abhishek
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (03) : 879 - 898
  • [36] Provable security efficient clustering-based group key agreement for ad hoc networks
    Hao, Bin
    Yang, Yu
    Luo, Shoushan
    Yang, Yixian
    International Journal of Advancements in Computing Technology, 2012, 4 (07) : 317 - 328
  • [37] ID-Based key agreement with anonymity for ad hoc networks
    Chien, Hung-Yu
    EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4808 : 333 - 345
  • [38] A Deniable Authenticated Key Agreement Protocol
    TIAN Haibo1
    2. Guangdong Key Laboratory of Information Security Technology
    Wuhan University Journal of Natural Sciences, 2008, (06) : 645 - 650
  • [39] A robust authenticated key agreement protocol
    Lee, HM
    Ryu, EK
    Kim, KW
    Lee, JM
    Yoo, KY
    COMPUTERS AND THEIR APPLICATIONS, 2003, : 76 - 79
  • [40] Anonymous Authenticated Key Agreement and Group Proof Protocol for Wearable Computing
    Guo, Yimin
    Zhang, Zhenfeng
    Guo, Yajun
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (08) : 2718 - 2731