An authenticated key agreement protocol for mobile ad hoc networks

被引:0
|
作者
Zou, Xukai [1 ]
Thukral, Amandeep [1 ]
Ramamurthy, Byrav [2 ]
机构
[1] Indiana Univ Purdue Univ, Indianapolis, IN 46202 USA
[2] Univ Nebraska, Lincoln, NE 68588 USA
关键词
network security; Chinese remainder theorem; key management; mobile ad hoc networks; secure group communication;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The growing popularity of wireless ad hoc networks has brought increasing attention to many security issues for such networks. A lot of research has been carried out in the areas of authentication and key management for such networks. However, due to lack of existing standards for such networks, most of the proposed schemes are based on different assumptions and are applicable only in specific environments. Recently Balachandran et al. proposed CRTDH [1], a novel key agreement scheme for group communications in wireless ad hoc networks. The protocol has many desirable properties such as efficient computation of group key and support for high dynamics. However, the protocol does not discuss mutual authentication among the nodes and hence, suffers from two kinds of attacks: man-in-the-middle attack and Least Common Multiple (LCM) attack. This paper identifies the problems with the current CRTDH scheme and discusses these attacks. AUTH-CRTDH, a modified key agreement protocol with authentication capability, is also presented. Results from extensive experiments that were run on the proposed protocol and some other key agreement protocols including CRTDH are also discussed. It can be observed from the experiments that the new scheme is comparable with the CRTDH scheme and better than many other non-authenticated schemes in terms of performance.
引用
收藏
页码:509 / +
页数:3
相关论文
共 50 条
  • [1] A One-Round Certificateless Authenticated Group Key Agreement Protocol for Mobile Ad Hoc Networks
    Cheng, Dongxu
    Liu, Jianwei
    Guan, Zhenyu
    Shang, Tao
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (11): : 2716 - 2722
  • [2] Multicast key agreement protocol for mobile ad hoc networks
    Boumso, Andre
    Bensaber, Boucif Amar
    Biskri, Ismail
    Khali, Samir
    [J]. WINSYS 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION NETWORKS AND SYSTEMS, 2006, : 86 - 94
  • [3] A three round authenticated group key agreement protocol for ad hoc networks
    Augot, Daniel
    Bhaskar, Raghav
    Issarny, Valerie
    Sacchetti, Daniele
    [J]. PERVASIVE AND MOBILE COMPUTING, 2007, 3 (01) : 36 - 52
  • [4] A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks
    Buettner, Carsten
    Huss, Sorin A.
    [J]. 2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2015, : 259 - 269
  • [5] Authenticated dynamic group key agreement for autoconfigurable Mobile Ad Hoc Networks
    Teo, Joseph Chee Ming
    Tan, Chik How
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2006, E89B (09) : 2480 - 2492
  • [6] Secure Authenticated Key Establishment Protocol for Ad hoc Networks
    Prakash, A. John
    Uthariaraj, V. Rhymend
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 87 - 94
  • [7] A Password-authenticated Key Agreement Scheme for Ad hoc Networks
    Hu Ronglei
    Chi Yaping
    Xu Fenglin
    Wei Zhanzhen
    Li Ran
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2943 - 2947
  • [8] Authenticated Symmetric Key Distribution For Mobile Ad Hoc Networks
    Dahshan, Hisham
    Irvine, James
    [J]. 2008 FIFTH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2008, : 847 - 852
  • [9] Key agreement protocol in ad-hoc networks
    Lang, WH
    Zhou, MT
    She, K
    [J]. 2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 296 - 301
  • [10] A New Authenticated Key Agreement Protocol for Wireless Mobile Networks
    Hwang, Shin-Jia
    Chai, Ming-Jhang
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 53 - 56