65 research outputs found

    Group Key Agreement in Ad hoc Networks

    Get PDF
    As the ubiquitous and pervasive computing paradigms gain popularity, Mobile Ad hoc NETworks (MANET) are receiving the increased attention of the research community. Essentially a MANET is a collection of mobile nodes communicating over wireless channels with little (if any at all) fixed, wired infrastructure. Such networks present a number of new challenges to many cryptographic techniques for collaborative group communication including Group Key Agreement. In this report are presented these challenges, some Group Key Agreement protocols proposed for Collaborative Groups and a discussion on their suitability for the MANET environment

    Efficient and Dynamic Group Key Agreement in Ad hoc Networks

    Get PDF
    Confidentiality, integrity and authentication are more relevant issues in Ad hoc networks than in wired fixed networks. One way to address these issues is the use of symmetric key cryptography, relying on a secret key shared by all members of the network. But establishing and maintaining such a key (also called the session key) is a non-trivial problem. We show that Group Key Agreement (GKA) protocols are suitable for establishing and maintaining such a session key in these dynamic networks. We take an existing GKA protocol, which is robust to connectivity losses and discuss all the issues for good functioning of this protocol in Ad hoc networks. We give implementation details and network parameters, which significantly reduce the computational burden of using public key cryptography in such networks

    An Observation about Variations of the Diffie-Hellman Assumption

    Get PDF
    We generalize the Strong Boneh-Boyen (SBB) signature scheme to sign vectors; we call this scheme GSBB. We show that if a particular (but most natural) average case reduction from SBB to GSBB exists, then the Strong Diffie-Hellman (SDH) and the Computational Diffie-Hellman (CDH) have the same worst-case complexity

    A three round authenticated group key agreement protocol for ad hoc networks

    Get PDF
    International audienceGroup Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also provide efficient ways to change the key when the participants change. While some of the proposed GKA protocols are too resource consuming for the constraint devices often present in ad hoc networks, others lack a formal security analysis. In this paper, we propose a simple, efficient and secure GKA protocol well-suited to ad hoc networks and present results of our implementation of the same in a prototype application
    corecore