A secure authenticated group key agreement protocol for resource-limited mobile devices

被引:28
|
作者
Tseng, Yuh-Min [1 ]
机构
[1] Natl Changhua Univ Educ, Dept Math, Changhua 500, Taiwan
来源
COMPUTER JOURNAL | 2007年 / 50卷 / 01期
关键词
security; contributory group key agreement; mobile device; provably secure; resource-limited;
D O I
10.1093/comjnl/bx1043
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With rapid growth of mobile wireless networks, many mobile applications have received significant attention. However, security will be an important factor for their full adoption. Most security technologies currently deployed in wired networks are not fully applicable to wireless networks involved in resource-limited mobile nodes because of their low-power computing capability and limited energy. The design of secure group key agreement protocols is one of many important security issues in wireless networks. A group key agreement protocol involves all participants cooperatively establishing a group key, which is used to encrypt/decrypt transmitted messages among participants over an open channel. Unfortunately, most previously proposed group key agreement protocols are too expensive computationally to be employed in mobile wireless networks. Recently, Bresson et al. proposed an authenticated group key agreement protocol suitable for a mobile wireless network. This mobile wireless network is an asymmetric wireless one that consists of many mobile nodes with limited computing capability and a powerful node with less restriction. However, this protocol does not satisfy some important security properties such as forward secrecy and contributory key agreement. In this paper, we propose a new authenticated group key agreement protocol, which is well suited for this asymmetric wireless network. The proposed protocol not only is efficient but also meets strong security requirements. We demonstrate that the proposed protocol is a real contributory group key agreement one and provides forward secrecy as well as implicit key authentication. The proposed protocol is provably secure against passive adversaries and impersonator's attacks. A simulation result shows that the proposed protocol is well suited for mobile devices with limited computing capability.
引用
收藏
页码:41 / 52
页数:12
相关论文
共 50 条
  • [1] A secure authenticated group key agreement protocol for resource-limited mobile devices
    Tseng, Yuh-Min
    [J]. Computer Journal, 2007, 50 (01): : 41 - 52
  • [2] Two Level Authenticated Group Key Agreement Protocol with Privacy-Preservation for Resource-Limited Mobile Devices
    Chang, Liang-Peng
    Wu, Tzong-Chen
    Hsu, Chien-Lung
    Lu, Chung-Fu
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2010, 11 (04): : 519 - 528
  • [3] CERTIFICATELESS AUTHENTICATED GROUP KEY AGREEMENT SCHEME WITH PRIVACY-PRESERVATION FOR RESOURCE-LIMITED MOBILE DEVICES
    Lu, Chung-Fu
    Wu, Tzong-Chen
    Hsu, Chen-Lung
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (1B): : 599 - 615
  • [4] A Secure Certificateless Authenticated Group Key Agreement Protocol
    Geng, Manman
    Zhang, Futai
    Gao, Meng
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 342 - 346
  • [5] A group authenticated key agreement protocol for secure communication between distributed terminal devices
    Cai, Junfei
    Zhang, Zheng
    Li, Mingyan
    Li, Nuannuan
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2024, 118
  • [6] A secure authenticated key agreement protocol
    Popescu, C
    [J]. MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 783 - 786
  • [7] An improved Secure Authenticated Group Key Agreement Protocol for WMNs
    Jin, Zhen-Ai
    Park, Geum-Dal
    Yoo, Kee-Young
    [J]. ALPIT 2008: SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED LANGUAGE PROCESSING AND WEB INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 412 - +
  • [8] An Improved Secure Certificateless Authenticated Group Key Agreement Protocol
    Geng, Manman
    Zhang, Futai
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTELLIGENT SYSTEMS, PROCEEDINGS, VOL 3, 2009, : 337 - 341
  • [9] A provable authenticated group key agreement protocol for mobile environment
    Sun, Hung-Min
    He, Bing-Zhe
    Chen, Chien-Ming
    Wu, Tsu-Yang
    Lin, Chia-Hsien
    Wang, Huaxiong
    [J]. INFORMATION SCIENCES, 2015, 321 : 224 - 237