DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yeun C.Y. | ko |
dc.contributor.author | Han K. | ko |
dc.contributor.author | Vo D.L. | ko |
dc.contributor.author | Kim, Kwangjo | ko |
dc.date.accessioned | 2009-12-29T05:33:29Z | - |
dc.date.available | 2009-12-29T05:33:29Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2008-08 | - |
dc.identifier.citation | INFORMATION SECURITY TECHNICAL REPORT, v.13, no.3, pp.158 - 164 | - |
dc.identifier.issn | 1363-4127 | - |
dc.identifier.uri | http://hdl.handle.net/10203/16000 | - |
dc.description.abstract | Due to dynamic and infrastructure-less nature of Mobile Ad hoc Network (MANET) environment, there exist number of threats as mobile devices and nodes could freely move around in MANET such as eavesdropping of communications channels, modification of sensitive m-commerce transactions, Denial of Service(DoS), vulnerabilities of impersonation by malicious insiders etc. In this paper, we propose a novel authenticated group key agreement protocol for end-to-end security in the MANET environment without any infrastructure that is based on Burmester and Desmedt group key agreement protocol (Burmester M, Desmedt Y. A secure and efficient conference key distribution system. Advances in Cryptology - EuroCrypt 94, Lecture Notes in Computer Science 1995;950:275-86) and their variants (Choi KY, Hwang JY, Lee DH. Efficient ID-based group key agreement with bilinear maps. Public Key Cryptography - PKC, Lecture Notes in Computer 2004;2947:130-144)]. We also design practical enhancements of BD and Choi et??al.s protocols that not only detect, but also identify malicious insiders by using the trusted arbiter who only involves in the protocol if the cheating has been occurred. Crown Copyright ?? 2008. | - |
dc.language | English | - |
dc.language.iso | en_US | en |
dc.publisher | Elsevier BV | - |
dc.title | Secure authenticated group key agreement protocol in the MANET environment | - |
dc.type | Article | - |
dc.identifier.scopusid | 2-s2.0-56049096287 | - |
dc.type.rims | ART | - |
dc.citation.volume | 13 | - |
dc.citation.issue | 3 | - |
dc.citation.beginningpage | 158 | - |
dc.citation.endingpage | 164 | - |
dc.citation.publicationname | INFORMATION SECURITY TECHNICAL REPORT | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Kim, Kwangjo | - |
dc.contributor.nonIdAuthor | Yeun C.Y. | - |
dc.contributor.nonIdAuthor | Han K. | - |
dc.contributor.nonIdAuthor | Vo D.L. | - |
dc.subject.keywordAuthor | Authenticated group key agreement | - |
dc.subject.keywordAuthor | Detect cheating | - |
dc.subject.keywordAuthor | Identifying malicious insiders | - |
dc.subject.keywordAuthor | MANET | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.