Browse > Article

Secure Group Communications Considering Computational Efficiency of Mobile Devices in Integrated Wired and Wireless Networks  

Chang Woo-Suk (School of Information and Communication Engineering, Sungkyunkwan University)
Kim Hyun-Jue (School of Information and Communication Engineering, Sungkyunkwan University)
Nam Jung-Hyun (School of Information and Communication Engineering, Sungkyunkwan University)
Cho Seok-Hyang (School of Information and Communication Engineering, Sungkyunkwan University)
Won Dong-Ho (School of Information and Communication Engineering, Sungkyunkwan University)
Kim Seung-Joo (School of Information and Communication Engineering, Sungkyunkwan University)
Publication Information
Abstract
Group key agreement protocols are designed to allow a group of parties communicating over a public network to securely and efficiently establish a common secret key, Over the years, a number of solutions to the group key agreement protocol have been proposed with varying degrees of complexity, and the research relating to group key agreement to securely communicate among a group of members in integrated wired and wireless networks has been recently proceeded. Both features of wired computing machines with the high-performance and those of wireless devices with the low-power are considered to design a group key agreement protocol suited for integrated wired and wireless networks. Especially, it is important to reduce computational costs of mobile devices which have the limited system resources. In this paper, we present an efficient group key agreement scheme which minimizes the computational costs of mobile devices and is well suited for this network environment and prove its security.
Keywords
Group key agreement; mobile devices; integrated wired and wireless networks; CDH assumption;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Nam, S. Kim, and D. Won, 'A Weakness in the Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices', IEEE Communications Letters, Vol. 9, no. 5, pp. 429-431, May, 2005   DOI   ScienceOn
2 J. Nam, J. Lee, S. Kim, and D. Won, 'DDH-based Group Key Agreement in a Mobile Environment', Journal of Systems and Software, Vol. 78, no. 1, pp. 73-83, October, 2005   DOI   ScienceOn
3 S. Cho, J. Nam, S. Kim, and D. Won, 'An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices', Proceedings of ICCSA 2005, International Conference on Computational Science and Applications, Springer-Verlag, LNCS 3480, pp. 498-507, May, 2005
4 T. Phan, L. Huang, and C. Dulan, 'Challenge: Integrating Mobile Wireless Devices into the Computational Grid', Proceedings of the 8th ACM Conference on Mobile Computing and Networking (MOBICOM'02), pp.271-278, September, 2002   DOI
5 Y. Kim, A. Perrig and G. Tsudik, 'Communication -efficient Group Key Agreement', Proceedings of International Federation for Information Processing (IFIP SEC'01), Springer- Verlag, LNCS 1163, pp. 229-244, June, 2001
6 E. Bresson, O. Chevassut, A. Essiari, and D. Pointcheval, 'Mutual authentication and group key agreement for low-power mobile devices', Proceedings of the 5th IFIP-TC6/IEEE International Conference on Mobile and Wireless Communications Networks (MWCN'03), pp. 59-62, October, 2003
7 M. Steiner, G. Tsudik and M. Waidner, 'Diffie-Hellman Key Distribution Extended to Group Communication', Proceedings of the 3rd ACM Conference on Computer and Communications Security (CSS'96), pp.31-37, May, 1996   DOI
8 K. Becker and U. Wille, 'Communication Complexity of Group key Distribution', Proceedings of the 5th ACM Conference on Computer and Communications Security (CCS'98), pp. 1-6, November, 1998   DOI
9 J. Katze and M. Yung, 'Scalable Protocols for Authenticated Group Key Exchange', Advances in Cryptology-Crypto'03, Springer-Verlag, LNCS 2729, pp. 110-125, August, 2003
10 M. Burmester and Y. Desmedt, 'A secure and Efficient Conference Key Distribution System', Advances in Cryptology-Eurocrypt'94, Springer-Verlag, LNCS 950, pp.275-286, 1995
11 J. Nam, S. Kim, and D. Won, 'Secure Group Communications over Combined Wired and Wireless Networks', Proceedings of TrustBus 2005, International Conference on Trust, Privacy, and Security in Digital Business (in conjunction with DEXA 2005), Springer-Verlag, LNCS 3592, pp. 90-99, August, 2005
12 W. Diffie and M. Hellman, 'New Directions in Cryptography', IEEE Transactions on Information Theory, Vol. 22, no. 6, pp. 644-654, November, 1976   DOI
13 I. Ingemarsson, D. Tang, and C. Wong, 'A Conference Key Distribution System', IEEE Transactions on Information Theory, Vol. 28, no. 5, pp. 714-720, September, 1982   DOI