Ad-hoc 네트워크에서 모바일 디바이스 아이디 기반의 그룹 키 관리에 대한 연구

A Study on Group Key Management based on Mobile Device ID in Ad-hoc network

  • 강서일 (순천향대학교 컴퓨터공학부) ;
  • 이남훈 (한국전자통신연구원 부설 연구소) ;
  • 이임영 (순천향대학교 컴퓨터공학부)
  • 발행 : 2009.04.30

초록

Ad-hoc 네트워크는 모바일 디바이스가 무선 통신을 이용한 데이터를 전송 및 서비스를 제공한다. Ad-hoc 네트워크에서의 모바일 디바이스는 안전한 통신을 위해 인증과 암호 키 관리가 필요하다. 본 논문에서는 Ad-hoc 네트워크에서 인증과 그룹 키 관리의 동향에 대하여 알아보고, 아이디 기반의 상호 인증 및 그룹 키 설립 방안에 대하여 제안한다. 제안 방식의 아이디 기반의 상호 인증은 공유한 정보가 없는 상태에서 영지식을 이용하고, 세션 키 및 그룹 키를 설립하는데 활용된다. 또한 제안 방식을 Ad-hoc 네트워크에 적용하여 효율성 및 보안 기술에 대해 안전성을 높인다.

An arbitrary mobile device configures Ad-hoc network to provide the transmission of a data and services using wireless communications. A mobile device requires authentication and encryption key management to securely communicate in the Ad-hoc network. This paper examines the trend of the authentication in the Ad-hoc network and the group key management and suggests the plan for ID-based mutual authentication and group key establishment. ID-based mutual authentication in proposed scheme uses zero knowledge in the absence of shared information and is applied to establish a session key and group key. In addition, the proposed scheme is applied to Ad-hoc network to increase the efficiency and the safety of security technology.

키워드

참고문헌

  1. Ingemar ingemarsson, Donald T.Tang and C.K. Wong, "A Conference key Distribution System," IEEE TRANSACTIONS on INFORMATION THEORY, Vol.28, No.5, pp. 714-721, 1982. 02. https://doi.org/10.1109/TIT.1982.1056542
  2. Laurent Eschenauer and Virgil D.Gligor, "A key-Management Scheme for Distributed Sensor Networks," CCS'02, pp. 18-22, 2002.
  3. Wang changda and Ju shiguang, "Multilevel security model for ad hoc networks," Journal of systems engineering and electronics, Vol.19, No.2, pp. 391-397, 2008. https://doi.org/10.1016/S1004-4132(08)60098-5
  4. Lijun Liao and Mark Manulis, "Tree-based group key agreement framework for mobile ad-hoc networks," FGCS, pp. 787-803, 2007
  5. Michael Steiner, Gene Tsudik and Michael Waidner, "Diffie-Hellman key Distribution Extended to Group communication," Proceedings of the 3rd ACM conference on computer and communications security, pp. 31-37, 1996
  6. Varadharajan et al. "Security for cluster based ad hoc networks,"comput commun, Vol.27, pp. 488-501, 2005. https://doi.org/10.1016/j.comcom.2003.10.005
  7. Jung-San Lee and chin-Chen Chang, "Secure communications for cluster-based ad hoc networks using node identities,"Journal of Network and computer Applications 30 (2007), pp. 1377-1396, 2007. https://doi.org/10.1016/j.jnca.2006.10.003
  8. G.V.S. Raju and Rehan Akbani, "Mobile Ad Hoc Networks Security,"Annual Review of Communications, Vol.58, pp. 625-628.
  9. Dijiang Huang and deep Medhi, "A secure group key management scheme for hierarchical mobile ad hoc networks," Ad Hoc Networks2008, pp. 560-577, 2008
  10. Eric Ricardo Anton and Otto Carlos Muniz Bandeira Duarte, "Group Key Establishment in Wireless Ad Hoc Networks," Workshop on quality of service and mobility, 2002.
  11. N.Asokan and P.Ginzboorg, "Key agreement in ad hoc networks," computer communications 2000, pp. 1627-1637, 2000.
  12. Nen-chung wang and shian-Zhang fang, "A hierarchical key management scheme for secure group communications in mobile ad hoc networks,"the journal of systems and software, pp. 1667-1677, 2007.
  13. Tzu-chiang Chiang and Yueh-Min Huang, "Group Keys and the Multicast security in Ad Hoc Networks," ICPPW'03, 2003.