Group Key Agreement Protocol Among Mobile Devices in Different Cells

  • Jeeyeon Kim
  • Seungjoo Kim
  • Kilsoo Chun
  • Jaeil Lee
  • Dongho Won
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4331)

Abstract

Mobile communication has become more pervasive and it is considered as one of main concerns of IP telephony, video conferencing, multi-user games and etc. in mobile environments. These applications require secure group communication between a multitude of mobile devices owned by group members. Most of the published group key agreement protocols are based on a model which consists of a stationary base station and a cluster of mobile devices. In this paper, we assume a more realistic scenario in which secret group key is established between several base stations and mobile devices in different cells. We present new group key protocol among mobile devices in different cells and analyze its security.

Keywords

Group communication Mobile device 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Asokan, N., Ginzboorg, P.: Key Agreement in Ad-hoc Networks, Expanded version of a talk given at the Nordsec 1999 workshop, (Februry 2000)Google Scholar
  2. 2.
    Bresson, E., Chevassut, O., Essiari, A., Pointcheval, D.: Mutual Authentication and Group Key Agreement for Low-Power Mobile Devices. In: International Conference on Mobile and Wireless Communications Networks. LNCS, vol. 1514, pp. 59–62. Springer, Heidelberg (2003)Google Scholar
  3. 3.
    Bresson, E., Chevassut, O., Pointcheval, D.: Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 497–514. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  4. 4.
    Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  5. 5.
    Borisov, N., Goldberg, I., Wagner, D.: Intercepting Mobile Communications: The Insecurity of 802.11. In: ACM MobiCom 2001 (2001)Google Scholar
  6. 6.
    Carroll, C., Frankel, Y., Tsiounis, Y.: Efficient key distribution for slow computing devices: Achieving fast over-the-air activation for wireless systems. In: IEEE Symposium on Security and Privacy (S&P 1998), Oakland, CA, May 3-6 (1998)Google Scholar
  7. 7.
    Ingemarsson, I., Tang, D.T., Wong, C.K.: A conference key distribution system. IEEE Transactions on Information Theory IT-28(5), 714–720 (1982)CrossRefMathSciNetGoogle Scholar
  8. 8.
    Nam, J., Kim, S., Won, D.: A Weakness in the Bresson-Chevassut-Essiari-Pointcheval. IEEE Communications Letters 9(5), 429–431 (2005)CrossRefGoogle Scholar
  9. 9.
    Nam, J., Lee, J., Kim, S., Won, D.: DDH-based Group Key Agreement in a Mobile Environment. Journal of Systems and Software 78(1), 73–83 (2005)CrossRefGoogle Scholar
  10. 10.
    Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman Key Distribution Extended to Group Communication. In: Proc. of the 3rd ACM Conference on Computer and Communication Security(CCS 1996), March 1996, pp. 31–37 (1996)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jeeyeon Kim
    • 1
  • Seungjoo Kim
    • 2
  • Kilsoo Chun
    • 1
  • Jaeil Lee
    • 1
  • Dongho Won
    • 2
  1. 1.Korea Information Security AgencySeoulKorea
  2. 2.Information Security GroupSungkyunkwan UniversityKorea

Personalised recommendations