Skip to main content

Key Agreement in Ad Hoc Networks

  • Conference paper
  • First Online:
Parallel and Distributed Processing and Applications (ISPA 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2745))

Abstract

A new key agreement protocol based on a shared conference password proposed in this paper. With this protocol, it provides an efficient algorithm and takes less computation cost to construct a secret communication channel. Besides, the honest participants can use password to authenticate themselves. The proposed scheme is suitable to apply in Ad Hoc Networks. It also provides an efficient protocol to reconstruct new session key when some members join or leave the conference.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. N. Asokan and Philip Ginzboorg. “Key-agreement in ad hoc networks”, Computer Communications, Vol. 23, No. 17, Nov. 2000, pp. 1627–1637.

    Article  Google Scholar 

  2. Giuseppe Ateniese, Michael Steiner, and Gene Tsudik. “Authenticated group key agreement and friends”, In Proc. 5th ACM Conference on Computer and Communications Security, Nov. 1998, pp. 17–26.

    Google Scholar 

  3. Giuseppe Ateniese, Michael Steiner, and Gene Tsudik. “New multiparty authentication services and key agreement protocols”, IEEE Journal on Selected Areas in Communications, Vol. 8, No. 4, Apr. 2001, pp. 628–640.

    Google Scholar 

  4. Klaus Becker and Uta Wille. “Communication complexity of group key distribution”, In Proc. 5th ACM Conference on Computer and Communications Security, Nov. 1998, pp. 1–6.

    Google Scholar 

  5. S. Bellovin and M. Merritt, “Encrypted key exchange: password-based protocols secure against dictionary attack”, IEEE Symposium on Research in Security and Privacy, 1992, pp. 72–84.

    Google Scholar 

  6. W. Diffie, and M.E. Hellman, “New directions in cryptography”, IEEE Trans. On Information Theory, Vol. IT-22, No.6, 1976, pp. 644–654.

    Article  MathSciNet  Google Scholar 

  7. Sahar M. Ghanem, Hussein Abdel-Wahab, “A simple XOR-based technique for distributing group key in secure multicasting”, In Proc. The Fifth IEEE Symposium on Computers and Communications, pp. 166–171, 2000.

    Google Scholar 

  8. Y. Kim, A. Perrig, and G. Tsudik. “Simple and fault-tolerant key agreement for dynamic collaborative group”, In 7th ACM conference on Computer and communications, Nov. 2000, pp. 235–244.

    Google Scholar 

  9. Silja Maki, Maarit Hietalahti, and Tuomas Aura. “A survey of ad-hoc network security”, Interim report of project 007-security of mobile agents and ad-hoc societies, Helsinki University of Technology, Laboratory for Theoretical Computer Science, Sep. 2000.

    Google Scholar 

  10. Michael Steiner, Gene Tsudik, and Michael Waidner. “CLIQUES: a new approach to group key agreement”, In Proc. 18th International Conference on Distributed Computing Systems (ICDCS’98), May 1998, pp. 380–387.

    Google Scholar 

  11. Michael Steiner, Gene Tsudik, and Michael Waidner. “Key agreement in dynamic peer groups”, IEEE Transactions on Parallel and Distributed Systems, Vol. 11, No. 8, Aug. 2000, pp. 769–780.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hwang, RJ., Chang, RC. (2003). Key Agreement in Ad Hoc Networks. In: Guo, M., Yang, L.T. (eds) Parallel and Distributed Processing and Applications. ISPA 2003. Lecture Notes in Computer Science, vol 2745. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-37619-4_38

Download citation

  • DOI: https://doi.org/10.1007/3-540-37619-4_38

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40523-8

  • Online ISBN: 978-3-540-37619-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics