A secure verifiable key agreement protocol for mobile conferencing

被引:0
|
作者
Saha, Mounita [1 ]
RoyChowdhury, Dipanwita [1 ]
Sengupta, Indranil [1 ]
机构
[1] Indian Inst Technol, Dept CSE, Kharagpur, W Bengal, India
关键词
key agreement protocols; authentication; mobile teleconference;
D O I
10.1109/COMSWA.2008.4554412
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A growing application area in wireless communications is mobile teleconference. However, wireless communication are more susceptible to eavesdropping and unauthorized access than the wired communication. It is therefore crucial to build secure conference scheme for such communication. In this work, propose a true conference key agreement scheme which addresses some security issues not considered in previous works on conference key schemes. In the proposed protocol, the users can verify the utilization of their share in key construction. Also, the scheme is forward secure, provides mutual authentication and secure dynamic joining and leaving. The protocol is shown to be resistant against replay and impersonation attacks.
引用
收藏
页码:219 / 222
页数:4
相关论文
共 50 条
  • [21] Secure Key Agreement and Key Protection for Mobile Device User Authentication
    Wu, Libing
    Wang, Jing
    Choo, Kim-Kwang Raymond
    He, Debiao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) : 319 - 330
  • [22] Secure key distribution protocol in mobile communications
    Yang, Hyungkyu
    An, YoungHwa
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 152 - 155
  • [23] Verifiable user quantum session key agreement protocol for smart home environment
    Yuguang Xu
    Zexi Li
    Liuyi Chen
    Hongfeng Zhu
    Quantum Information Processing, 2021, 20
  • [24] Verifiable user quantum session key agreement protocol for smart home environment
    Xu, Yuguang
    Li, Zexi
    Chen, Liuyi
    Zhu, Hongfeng
    QUANTUM INFORMATION PROCESSING, 2021, 20 (12)
  • [25] A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications
    Abi-Char, Pierre E.
    Mhamed, Abdallah
    El-Hassan, Bachar
    NGMAST 2007: 2007 INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES, 2007, : 235 - +
  • [26] An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices
    Libing Wu
    Yubo Zhang
    Yong Xie
    Abdulhameed Alelaiw
    Jian Shen
    Wireless Personal Communications, 2017, 94 : 3371 - 3387
  • [27] A construction of post quantum secure and signal leakage resistant authenticated key agreement protocol for mobile communication
    Kumar, Uddeshaya
    Garg, Manish
    Kumari, Saru
    Dharminder, Dharminder
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (01)
  • [28] An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices
    Wu, Libing
    Zhang, Yubo
    Xie, Yong
    Alelaiw, Abdulhameed
    Shen, Jian
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 3371 - 3387
  • [29] Secure group key agreement protocol based on chaotic Hash
    Guo, Xianfeng
    Zhang, Jiashu
    INFORMATION SCIENCES, 2010, 180 (20) : 4069 - 4074
  • [30] A secure identification and key agreement protocol with user anonymity (SIKA)
    Mangipudi, Kumar
    Katti, Rajendra
    COMPUTERS & SECURITY, 2006, 25 (06) : 420 - 425