New User Authentication and Key Management Scheme for Secure Data Transmission in Wireless Mobile Multicast

被引:0
|
作者
Eya, N. [1 ]
Elkhazmi, E. [1 ,2 ]
Jituboh, E. [3 ]
Masri, A. [4 ]
Dama, Y. [4 ]
Ahmed, Nuredin A. S. [5 ]
Abdul-jalil, C. [3 ]
Fayemi, O. [3 ]
Shephred, S. J. [1 ]
Abd-Alhameed, Raed [1 ]
机构
[1] Univ Bradford, Sch Elect Engn & Comp Sci, Bradford, W Yorkshire, England
[2] Higher Inst Elect, Bani Walid, Libya
[3] Natl Open Univ Nigeria, Jabi Abuja, Nigeria
[4] An Najah Natl Univ, Nablus, Palestine
[5] Azzaytuna Univ, Fac Engn, Comp Engn Dept, Bani Walid, Libya
关键词
Authentication; Group communication; Key Management; Multicast Security; Wireless mobile multicast communication security; COMMUNICATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to the nature of multicast communication, security is an important challenge that needs to be addressed. It is of paramount importance that the confidentiality and authentication of messages transmitted between participating mobile nodes be maintained due to the sensitivity of the messages. This paper presents a high-level dual authentication scheme that would effectively prevent unauthorised users from participating in a multicast group communication. Secondly, one of the nature of users in a multicast communication is join and leave, this paper also proposes a dual group key management scheme to efficiently distribute a group key to a group of users and to update such group keys during the users' join and leave operations to prevent forward and backward secrecy. One of the major strengths of this scheme is that registration and deregistration of users can be achieved at a lower computational cost. The results of the proposed scheme promise a great deal of efficiency computationally compared to other existing schemes reviewed in the literature.
引用
收藏
页码:264 / 269
页数:6
相关论文
共 50 条
  • [1] A New Multiple Service Key Management Scheme for Secure Wireless Mobile Multicast
    Mapoka, Trust T.
    Shepherd, Simon J.
    Abd-Alhameed, Raed A.
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2015, 14 (08) : 1545 - 1559
  • [2] An efficient key management scheme for secure wireless multicast
    Sun, Y
    Trappe, W
    Liu, KJR
    [J]. 2002 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2002, : 1236 - 1240
  • [3] Efficient and secure source authentication scheme for multicast user authentication
    Jeong, Yoon-su
    Lee, Sang-hyuk
    Shin, Seung-soo
    [J]. JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2013, 20 (10) : 2741 - 2746
  • [4] Efficient and secure source authentication scheme for multicast user authentication
    Yoon-su Jeong
    Sang-hyuk Lee
    Seung-soo Shin
    [J]. Journal of Central South University, 2013, 20 : 2741 - 2746
  • [5] Efficient and secure source authentication scheme for multicast user authentication
    JEONG Yoon-su
    LEE Sang-hyuk
    SHIN Seung-soo
    [J]. Journal of Central South University, 2013, 20 (10) : 2741 - 2746
  • [6] Hybrid group key management scheme for secure wireless multicast
    Wang, Yiling
    Le, Phu Dung
    Srinivasan, Balasubramaniam
    [J]. 6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 346 - +
  • [7] HKM: A hybrid key management scheme for secure mobile multicast
    Lin, Lin
    Li, XueMing
    Cheng, Yong
    [J]. INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, PROCEEDINGS, 2007, : 109 - +
  • [8] A Secure Authentication and Key Management Scheme for Wireless Sensor Networks
    Khan, Sarmadullah
    Khan, Rafiullah
    [J]. SENSOR SYSTEMS AND SOFTWARE, 2015, 143 : 51 - 60
  • [9] A new secure group key management scheme for multicast over wireless cellular networks
    Um, Hwayoung
    Delp, Edward J.
    [J]. 2006 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2006, : 23 - +
  • [10] Provably secure user authentication and key agreement scheme for wireless sensor networks
    Das, Ashok Kumar
    Kumari, Saru
    Odelu, Vanga
    Li, Xiong
    Wu, Fan
    Huang, Xinyi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3670 - 3687