資料載入中.....
|
請使用永久網址來引用或連結此文件:
http://ir.ncue.edu.tw/ir/handle/987654321/12163
|
題名: | A Secure Authenticated Group Key Agreement Protocol for Resource-limited Mobile Devices |
作者: | Tseng, Yuh-Min |
貢獻者: | 數學系 |
關鍵詞: | Security;Contributory group key agreement;Mobile device;Provably secure;Resource-limited |
日期: | 2007
|
上傳時間: | 2012-07-03T03:45:01Z
|
出版者: | Oxford University Press Oxford |
摘要: | With rapid growth of mobile wireless networks, many mobile applications have received significant attention. However, security will be an important factor for their full adoption. Most security technologies currently deployed in wired networks are not fully applicable to wireless networks involved in resource-limited mobile nodes because of their low-power computing capability and limited energy. The design of secure group key agreement protocols is one of many important security issues in wireless networks. A group key agreement protocol involves all participants cooperatively establishing a group key, which is used to encrypt/decrypt transmitted messages among participants over an open channel. Unfortunately, most previously proposed group key agreement protocols are too expensive computationally to be employed in mobile wireless networks. Recently, Bresson et al. proposed an authenticated group key agreement protocol suitable for a mobile wireless network. This mobile wireless network is an asymmetric wireless one that consists of many mobile nodes with limited computing capability and a powerful node with less restriction. However, this protocol does not satisfy some important security properties such as forward secrecy and contributory key agreement. In this paper, we propose a new authenticated group key agreement protocol, which is well suited for this asymmetric wireless network. The proposed protocol not only is efficient but also meets strong security requirements. We demonstrate that the proposed protocol is a real contributory group key agreement one and provides forward secrecy as well as implicit key authentication. The proposed protocol is provably secure against passive adversaries and impersonator's attacks. A simulation result shows that the proposed protocol is well suited for mobile devices with limited computing capability. |
關聯: | The Computer Journal, 50(1): 41-52 |
顯示於類別: | [數學系] 期刊論文
|
文件中的檔案:
檔案 |
大小 | 格式 | 瀏覽次數 |
index.html | 0Kb | HTML | 521 | 檢視/開啟 |
|
在NCUEIR中所有的資料項目都受到原著作權保護.
|