Group Authentication and Group Key Distribution for Ad Hoc Networks
نویسندگان
چکیده
Group authentication and group key distribution ensure the security of group communication. Most existing schemes of group authentication and group key distribution need the assistance of a group manager. However, deciding upon a group manager can be difficult work for some practical applications, especially in an Ad Hoc network. Therefore, we proposed a group authentication and group key distribution scheme that does not require a group manager. Our proposed scheme is an identitybased scheme based on bilinear pairing. In our proposed scheme, any user can easily generate a group for communication purposes. All or part of a group can authenticate each other and obtain a group key without foreknowledge or limiting the number of individuals attending the communication session. Any group member can join or quit the group communication securely in the duration of the meeting. Our proposed scheme requires little communication and computation cost and is resistant to common attacks. Furthermore, in order to take full advantage of the properties of computing ability, which can differ within Ad Hoc networks, our proposed scheme can designate the user with the greatest computing ability to distribute the group key.
منابع مشابه
A New Group Key Management Protocol for Wireless Ad-Hoc Networks
Ad hoc networks are characterized by multi-hop wireless connectivity and frequently changing network topology. Forming security association among a group of nodes in ad-hoc networks is more challenging than in conventional networks due to the lack of central authority, i.e. fixed infrastructure. With that view in mind, group key management plays an important building block of any secure group c...
متن کاملSelf-Organized Hash Based Secure Multicast Routing Over Ad Hoc Networks
Multicast group communication over mobile ad hoc networks has various challenges related to secure data transmission. In order to achieve this goal, there is a need to authenticate the group member as well as it is essential to protect the application data, routing information, and other network resources etc. Multicast-AODV (MAODV) is the extension of an AODV protocol, and there are several is...
متن کاملIdentity Authentication and Key Agreement Schemes for Ad Hoc Networks
Identity authentication and key agreement schemes play significant role in ad hoc networks. In this paper, a new identity authentication scheme relies on the threshold group signature is introduced. Compared with the current schemes it is secure, efficient and adaptable to a multi-hop feature of ad hoc networks. In addition, a new key agreement scheme based on the threshold cryptography using t...
متن کاملSelf-healing group key distribution with time-limited node revocation for wireless sensor networks
A novel key distribution scheme with time-limited node revocation is proposed for secure group communications in wireless sensor networks. The proposed scheme offers two important security properties: the seal-healing re-keying message distribution which features periodic one-way re-keying with implicitly authentication, efficient tolerance for the lost rekeying messages, and seamless Traffic E...
متن کاملGroup Key Distribution Schemes for Secure Multicast in Mobile Ad Hoc Networks
In this paper, we give a brief overview of several recent proposals that address the problem of group key distribution in secure multicasting over mobile ad hoc networks. We discuss the requirements and challenges raised from multicast in ad hoc networks in general and group key distribution over mobile ad hoc networks in particular. We also give the analysis of each proposal in terms of effici...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 17 شماره
صفحات -
تاریخ انتشار 2015