National Changhua University of Education Institutional Repository : Item 987654321/12161
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 6507/11669
Visitors : 29890530      Online Users : 300
RC Version 3.2 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Adv. Search
LoginUploadHelpAboutAdminister
NCUEIR > College of Science > math > Periodical Articles >  Item 987654321/12161

Please use this identifier to cite or link to this item: http://ir.ncue.edu.tw/ir/handle/987654321/12161

Title: A Resource-constrained Group Key Agreement Protocol for Imbalanced Wireless Networks
Authors: Tseng, Yuh-Min
Contributors: 數學系
Keywords: Resource-constrained;Imbalanced wireless network;Group key agreement;Provable security;Decisional Diffie-Hellman problem
Date: 2007-06
Issue Date: 2012-07-03T03:44:59Z
Publisher: Elsevier
Abstract: Secure group communication is an important research issue for network security because of the popularity of group-oriented applications such as electronic conferences and collaborative works. The secure group key agreement protocol design is crucial for achieving secure group communications. As we all know, most security technologies are currently deployed in wired networks and are not fully applicable to wireless networks involving mobile devices with limited computing capability. In 2005, Nam et al. proposed a group key agreement protocol for a wireless environment. Unfortunately, in this paper we present that their protocol has a security weakness in which participants cannot confirm that their contributions were actually involved in the group key establishment. This is an important property of group key agreement. Therefore, we propose a new group key agreement protocol for an imbalanced wireless network consisting of many mobile nodes with limited computing capability and a powerful node with less restriction. We show that the proposed protocol produces contributory group key agreement. We demonstrate that the proposed protocol is provably secure against passive attacks under the decisional Diffie–Hellman problem assumption. A simulation result on a personal digital assistant (PDA) shows that the proposed protocol is well suited for mobile devices with limited computing capability.
Relation: Computers & Security, 26(4): 331-337
Appears in Collections:[math] Periodical Articles

Files in This Item:

File SizeFormat
index.html0KbHTML693View/Open


All items in NCUEIR are protected by copyright, with all rights reserved.

 


DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback