Group Authentication and Group Key Distribution for Ad Hoc Networks

نویسندگان

  • Feng Wang
  • Chin-Chen Chang
  • Yeh-Chieh Chou
چکیده

Group authentication and group key distribution ensure the security of group communication. Most existing schemes of group authentication and group key distribution need the assistance of a group manager. However, deciding upon a group manager can be difficult work for some practical applications, especially in an Ad Hoc network. Therefore, we proposed a group authentication and group key distribution scheme that does not require a group manager. Our proposed scheme is an identitybased scheme based on bilinear pairing. In our proposed scheme, any user can easily generate a group for communication purposes. All or part of a group can authenticate each other and obtain a group key without foreknowledge or limiting the number of individuals attending the communication session. Any group member can join or quit the group communication securely in the duration of the meeting. Our proposed scheme requires little communication and computation cost and is resistant to common attacks. Furthermore, in order to take full advantage of the properties of computing ability, which can differ within Ad Hoc networks, our proposed scheme can designate the user with the greatest computing ability to distribute the group key.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Group Key Management Protocol for Wireless Ad-Hoc Networks

Ad hoc networks are characterized by multi-hop wireless connectivity and frequently changing network topology. Forming security association among a group of nodes in ad-hoc networks is more challenging than in conventional networks due to the lack of central authority, i.e. fixed infrastructure. With that view in mind, group key management plays an important building block of any secure group c...

متن کامل

Self-Organized Hash Based Secure Multicast Routing Over Ad Hoc Networks

Multicast group communication over mobile ad hoc networks has various challenges related to secure data transmission. In order to achieve this goal, there is a need to authenticate the group member as well as it is essential to protect the application data, routing information, and other network resources etc. Multicast-AODV (MAODV) is the extension of an AODV protocol, and there are several is...

متن کامل

Identity Authentication and Key Agreement Schemes for Ad Hoc Networks

Identity authentication and key agreement schemes play significant role in ad hoc networks. In this paper, a new identity authentication scheme relies on the threshold group signature is introduced. Compared with the current schemes it is secure, efficient and adaptable to a multi-hop feature of ad hoc networks. In addition, a new key agreement scheme based on the threshold cryptography using t...

متن کامل

Self-healing group key distribution with time-limited node revocation for wireless sensor networks

A novel key distribution scheme with time-limited node revocation is proposed for secure group communications in wireless sensor networks. The proposed scheme offers two important security properties: the seal-healing re-keying message distribution which features periodic one-way re-keying with implicitly authentication, efficient tolerance for the lost rekeying messages, and seamless Traffic E...

متن کامل

Group Key Distribution Schemes for Secure Multicast in Mobile Ad Hoc Networks

In this paper, we give a brief overview of several recent proposals that address the problem of group key distribution in secure multicasting over mobile ad hoc networks. We discuss the requirements and challenges raised from multicast in ad hoc networks in general and group key distribution over mobile ad hoc networks in particular. We also give the analysis of each proposal in terms of effici...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 17  شماره 

صفحات  -

تاریخ انتشار 2015