Abstract
With the advent of wireless and ubiquitous computing, group communication in heterogeneous environment is gaining popularity. Although a number of protocols for group key agreement exist in the literature, most of them are not applicable in heterogeneous environment where a number of computationally limited nodes coexist with one or more computationally efficient nodes. Among the few existing protocols, where some fail to satisfy the key agreement properties, some are unable to handle the agreement for dynamic group. In this work, we propose a constant round group key agreement protocol for heterogeneous environment using polynomial interpolation. The protocol ensures both communication and computation efficiency by shifting the major computation load on powerful users, achieves true contributory key agreement property and dynamic handling of user join and leave. The security of the protocol has been analyzed under formal model. The comparison result shows considerable improvement in protocol efficiency compared to the existing ones.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Boyd, C., Nieto, J.: Round-optimal contributory conference key agreement. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 161–174. Springer, Heidelberg (2002)
Bresson, E., Catalano, D.: Constant round authenticated group key agreement via distributed computation. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 115–129. Springer, Heidelberg (2004)
Becker, K., Wille, U.: Communication complexity of group key distribution. In: 5th ACM Conf. on Computer and Communications Security, pp. 1–6 (1998)
Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)
Bresson, E., Chevassut, O., Pointcheval, D.: Mutual authentication and group key agreement for low-power mobile devices. Computer Communications 27, 1730–1737 (2004)
Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.: Provably authenticated group diffie-hellman key exchange. In: 8th ACM Conf. on Computer and Communications Security, pp. 255–264 (2001)
Ateniese, G., Tsudik, G.: New multiparty authentication services and key agreement protocols. IEEE Journal on Selected Areas in Communications 18, 628–639 (2000)
Hwang, K., Chang, C.: A self-encryption mechanism for authentication of roaming and teleconference services. IEEE Transaction on Wireless Communications 2, 400–407 (2003)
Ingermarsson, I., Wong, C.: A conference key distribution system. IEEE Trans. on Information Theory 28, 714–720 (1982)
Nam, J., Kim, S., Won, D.: A weakness in the. bresson-chevassut-essiari-pointcheval’s group key agreement scheme for low-power mobile devices. IEEE Communications Letters 9, 429–431 (2005)
Nam, J., Lee, J., Kim, S., Won, D.: DDH-based group key agreement in a mobile environment. Journal of Systems and Software 78, 73–83 (2005)
Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110–125. Springer, Heidelberg (2003)
Tseng, Y.: A resource-constrained group key agreement protocol for imbalanced wireless networks. Computers and Security 26, 331–337 (2007)
Tzeng, W., Tzeng, Z.-J.: Round-efficient conference key agreement protocols with provable security. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 614–627. Springer, Heidelberg (2000)
Jiang, Y., Lin, C., Shi, M., Shen, X.S.: A self-encryption authentication protocol for teleconference services. International Journal of Security and Networks 1, 198–205 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Saha, M., RoyChowdhury, D. (2011). An Efficient Protocol for Authenticated Group Key Agreement in Heterogeneous Networks. In: Obaidat, M.S., Filipe, J. (eds) e-Business and Telecommunications. ICETE 2009. Communications in Computer and Information Science, vol 130. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20077-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-20077-9_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20076-2
Online ISBN: 978-3-642-20077-9
eBook Packages: Computer ScienceComputer Science (R0)