Advertisement

Ad Hoc Security Associations for Groups

  • Jukka Valkonen
  • N. Asokan
  • Kaisa Nyberg
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4357)

Abstract

A security association specifies the cryptographic keys and algorithms to be used for secure communication among the participants in the association. Key agreement in ad hoc scenarios, that is, without key management infrastructure is a challenging task, in particular, if the security association should involve a group of entities. In this paper, existing pairwise ad hoc key agreement protocols are extended for groups of arbitrary number of entities. New protocols based on both passkeys and numeric comparison (short authenticated strings) are presented. Also security properties and group management for these protocols are discussed.

Keywords

ad hoc group security association key agreement passkey numeric comparison 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [ABCP06]
    Abdalla, M., Bresson, E., Chevassut, O., Pointcheval, D.: Password-based Group Key Exchange in a Constant Number of Rounds. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 427–442. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  2. [AG00]
    Asokan, N., Ginzboorg, P.: Key Agreement in Ad-hoc Networks. Computer Communications Review 23(17), 1627–1637 (2000)CrossRefGoogle Scholar
  3. [BDG+04]
    Balfanz, D., Durfee, G., Grinter, R.E., Smetters, D.K., Stewart, P.: Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute. In: 13th Usenix Security Symposium, San Diego, CA (August 2004)Google Scholar
  4. [Blu06]
    Bluetooth SIG. Bluetooth Simple Pairing Whitepaper. Technical report, Bluetooth SIG (2006), http://www.bluetooth.com/Bluetooth/Apply/Technology/Research/Simple_Pairing.htm
  5. [BM92]
    Bellovin, S.M., Merritt, M.: Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks. In: 1992 IEEE Computer Society Symposium, pp. 72–84 (1992)Google Scholar
  6. [BSSW02]
    Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Proceedings of Network and Distributed System Security Symposium 2002 (NDSS 2002), San Diego, CA (February 2002)Google Scholar
  7. [ČČH06]
    Čagalj, M., Čapkun, S., Hubaux, J.-P.: Key Agreement in Peer-to-Peer Wireless Networks. Proceedings of the IEEE (Special Issue on Security and Cryptography) 92(2), 467–478 (2006)Google Scholar
  8. [DB06]
    Dutta, R., Barua, R.: Password-Based Encrypted Group Key Agreement. International Journal of Network Security 3(1), 23–34 (2006)Google Scholar
  9. [DH76]
    Diffie, W., Hellman, M.E.: New Directions In Cryptography. IEEE Transactions on Information Theory IT-22, 644–654 (1976)CrossRefMathSciNetGoogle Scholar
  10. [Dig00]
    Digital Signature Standard (DSS) (FIPS PUB 186-2) (February 2000), http://csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf
  11. [GMN04]
    Gehrmann, C., Mitchell, C.J., Nyberg, K.: Manual Authentication for Wireless Devices. RSA Cryptobytes 7(1) (2004)Google Scholar
  12. [GSS+06]
    Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G., Uzun, E.: Loud And Clear: Human Verifiable Authentication Based on Audio (2006), http://www.ics.uci.edu/~ccsp/lac/LoudAndClear_files/icdcs.pdf
  13. [LAN05]
    Laur, S., Asokan, N., Nyberg, K.: Efficient Mutual Data Authentication Using Manually Authenticated Strings. Cryptology ePrint Archive, Report 2005/424 (2005), http://eprint.iacr.org/
  14. [LHL04]
    Lee, S.-M., Hwang, J.Y., Lee, D.H.: Efficient password-based group key exchange. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol. 3184, pp. 191–199. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  15. [LN06]
    Laur, S., Nyberg, K.: Efficient Mutual Data Authentication Using Manually Authenticated Strings. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol. 4301, pp. 90–107. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  16. [PV06]
    Pasini, S., Vaudenay, S.: SAS-Based Authenticated Key Agreement. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 395–409. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  17. [SA99]
    Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless networks. In: Security Protocols, 7th International Workshop Proceedings (1999)Google Scholar
  18. [STW96]
    Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman Key Distribution Extended to Group Communication. In: CCS 1996: Proceedings of the 3rd ACM conference on Computer and communications security, pp. 31–37. ACM Press, New York (1996)CrossRefGoogle Scholar
  19. [Vau05]
    Vaudenay, S.: Secure Communications over insecure Channels Based on Short Authenticated Strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 309–326. Springer, Heidelberg (2005)Google Scholar
  20. [WUS06]
    Association Models Supplement to the Certified Wireless Universal Serial Bus Specification (2006), http://www.usb.org/developers/wusb/wusb_2006_0302.zip
  21. [Zim06]
    Philip Zimmermann. Zfone homepage (2006), http://www.philzimmermann.com/EN/zfone/index.html

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jukka Valkonen
    • 1
  • N. Asokan
    • 1
    • 2
  • Kaisa Nyberg
    • 1
    • 2
  1. 1.Helsinki University of Technology 
  2. 2.Nokia Research Center 

Personalised recommendations