Secure authenticated group key agreement protocol in the MANET environment

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 631
  • Download : 156
DC FieldValueLanguage
dc.contributor.authorYeun C.Y.ko
dc.contributor.authorHan K.ko
dc.contributor.authorVo D.L.ko
dc.contributor.authorKim, Kwangjoko
dc.date.accessioned2009-12-29T05:33:29Z-
dc.date.available2009-12-29T05:33:29Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2008-08-
dc.identifier.citationINFORMATION SECURITY TECHNICAL REPORT, v.13, no.3, pp.158 - 164-
dc.identifier.issn1363-4127-
dc.identifier.urihttp://hdl.handle.net/10203/16000-
dc.description.abstractDue to dynamic and infrastructure-less nature of Mobile Ad hoc Network (MANET) environment, there exist number of threats as mobile devices and nodes could freely move around in MANET such as eavesdropping of communications channels, modification of sensitive m-commerce transactions, Denial of Service(DoS), vulnerabilities of impersonation by malicious insiders etc. In this paper, we propose a novel authenticated group key agreement protocol for end-to-end security in the MANET environment without any infrastructure that is based on Burmester and Desmedt group key agreement protocol (Burmester M, Desmedt Y. A secure and efficient conference key distribution system. Advances in Cryptology - EuroCrypt 94, Lecture Notes in Computer Science 1995;950:275-86) and their variants (Choi KY, Hwang JY, Lee DH. Efficient ID-based group key agreement with bilinear maps. Public Key Cryptography - PKC, Lecture Notes in Computer 2004;2947:130-144)]. We also design practical enhancements of BD and Choi et??al.s protocols that not only detect, but also identify malicious insiders by using the trusted arbiter who only involves in the protocol if the cheating has been occurred. Crown Copyright ?? 2008.-
dc.languageEnglish-
dc.language.isoen_USen
dc.publisherElsevier BV-
dc.titleSecure authenticated group key agreement protocol in the MANET environment-
dc.typeArticle-
dc.identifier.scopusid2-s2.0-56049096287-
dc.type.rimsART-
dc.citation.volume13-
dc.citation.issue3-
dc.citation.beginningpage158-
dc.citation.endingpage164-
dc.citation.publicationnameINFORMATION SECURITY TECHNICAL REPORT-
dc.embargo.liftdate9999-12-31-
dc.embargo.terms9999-12-31-
dc.contributor.localauthorKim, Kwangjo-
dc.contributor.nonIdAuthorYeun C.Y.-
dc.contributor.nonIdAuthorHan K.-
dc.contributor.nonIdAuthorVo D.L.-
dc.subject.keywordAuthorAuthenticated group key agreement-
dc.subject.keywordAuthorDetect cheating-
dc.subject.keywordAuthorIdentifying malicious insiders-
dc.subject.keywordAuthorMANET-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0