Accelerating Key Establishment Protocols for Mobile Communication

نویسندگان

  • Seungwon Lee
  • Seong-Min Hong
  • Hyunsoo Yoon
  • Yookun Cho
چکیده

Mobile communication is more vulnerable to security attacks such as interception and unauthorized access than xed network communication. To overcome these problems, many protocols have been proposed to provide a secure channel between a mobile station and a base station. However, the public-key based protocols are not fully utilized due to the poor computing power and the small battery capacity of a mobile station. In this paper, we propose some techniques accelerating public-key based key establishment protocols between a mobile station and a base station. The proposed techniques enable a mobile station to borrow computing power from a base station without revealing its secret information. The proposed schemes accelerate the previous protocols up to ve times and reduce the amount of power consumption of a mobile station. The proposed schemes use SASC (Server-Aided Secret Computation) protocols that are used for smart cards. Our insight is that the unbalanced property in computing power of the mobile communication is similar to that of the smart card system. The acceleration degrees of the proposed schemes are quite diierent from one another according to the used SASC protocols. In this paper, we analyze the acceleration factors of the proposed schemes and compare them with one another. The analysis shows that one of the approach presents outstanding performance among them.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Key Establishment Protocols for Secure Mobile Communications: A Selective Survey

We analyse several well-known key establishment protocols for mobile communications. The protocols are examined with respect to their security and suitability in mobile environments. In a number of cases weaknesses are pointed out, and in many cases reenements are suggested, either to improve the eeciency or to allow simpliied security analysis.

متن کامل

Forward Secrecy and Its Application to Future Mobile Communications Security

Perfect forward secrecy, one of the possible security features provided by key establishment protocols, concerns dependency of a session key upon long-term secret keys (symmetric or asymmetric). The feature promises that even if a long-term private key is disclosed to any adversary, the session keys established in the protocol runs using the long-term key would not be compromised. The importanc...

متن کامل

A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks

Privacy and security should be paid much more attention in secure vehicular ad hoc networks (VANETs). However, as far as we know, few researches on secure VANET protocols have addressed both the privacy issues and authenticated key establishment. Therefore, in this work, a lightweight authenticated key establishment scheme with privacy preservation to secure the communications between mobile ve...

متن کامل

Robust self - keying mobile ad hoc networks q

Pairwise key establishment in mobile ad hoc networks allows any pair of nodes to agree upon a shared key. This is an important security service needed to secure routing protocols, and in general to facilitate secure communication among the nodes of the network. We present two self-keying mechanisms for pairwise key establishment in mobile ad hoc networks which do not require any centralized sup...

متن کامل

Performance Analysis of Group Key Establishment Protocols in Ad Hoc Networks

Wireless ad hoc networks possess two main characteristics: absence of infrastructure and the possibility to connect mobile devices. These networks are however very fragile regarding security. This work focuses on the establishment of a secret cryptographic key among a group of devices that are part of an ad hoc network. Amongst the analyzed protocols for group key establishment, two present sup...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999