Encyclopedia of Wireless Networks

Living Edition
| Editors: Xuemin (Sherman) Shen, Xiaodong Lin, Kuan Zhang

Wireless Group Authentication

  • Anxi WangEmail author
Living reference work entry
DOI: https://doi.org/10.1007/978-3-319-32903-1_316-1



Entities in wireless networks are always organized into group for network managers’ convenience. Group authentication is the entity identification strategy based on the identities or features of the wireless entities. Owing to the group structure, group authentication is very suitable for wireless networks. In addition, group authentication is one of the most important technologies for wireless communication in that network.

Historical Background

Group authentication is developed to provide better security for group-oriented network. In a wireless group-oriented network, there are multiple entities wanting to form a private network to exchange messages. In order to protect the exchanged messages, every entity in the network should authenticate others. According to the centralized authentication (CA) server’s participation, group authentication schemes can be divided into three types: CA-centric type, entity-centric type, and...

This is a preview of subscription content, log in to check access.


  1. Ateniese G, Steiner M, Tsudik G (1998) Authenticated group key agreement and friends. In: Proceedings of the 5th ACM conference on computer and communications security. ACM, New York, NY, pp 17–26Google Scholar
  2. Bechkit W, Challal Y, Bouabdallah A, Tarokh V (2013) A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Trans Wirel Commun 12(2):948–959CrossRefGoogle Scholar
  3. Bhakti MAC, Abdullah A, Jung LT (2007) Eap-based authentication for ad hoc network. In: Seminar Nasional Aplikasi Teknologi Informasi (SNATI)Google Scholar
  4. Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: Symposium on security and privacy. IEEE, Washington, DC, pp 197–213Google Scholar
  5. Craiger JP et al (2002) 802.11, 802.1x, and wireless security. SANS Institute InfoSec Reading RoomGoogle Scholar
  6. Fuyou M, Yan X, Xingfu W, Badawy M (2015) Randomized component and its application to (t, m, n)-group oriented secret sharing. IEEE Trans Inf Forensics Secur 10(5):889–899CrossRefGoogle Scholar
  7. Harn L (2013) Group authentication. IEEE Trans Comput 62(9):1893–1898MathSciNetCrossRefGoogle Scholar
  8. Lai C, Li H, Lu R, Shen XS (2013) SE-AKA: a secure and efficient group authentication and key agreement protocol for LTE networks. Comput Netw 57(17):3492–3510CrossRefGoogle Scholar
  9. Lin HY, Yang CY, Hsieh MY (2012) Secure map reduce data transmission mechanism in cloud computing using threshold secret sharing scheme. In: Software engineering and knowledge engineering: theory and practice. Springer, Berlin/Heidelberg, pp 761–769CrossRefGoogle Scholar
  10. Perrig A, Canetti R, Tygar JD, Song D (2005) The tesla broadcast authentication protocol. Rsa Cryptobytes 5Google Scholar
  11. Ren K, Yu S, Lou W, Zhang Y (2009) Multi-user broadcast authentication in wireless sensor networks. IEEE Trans Veh Technol 58(8):4554–4564CrossRefGoogle Scholar
  12. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613MathSciNetCrossRefGoogle Scholar
  13. Wang CL, Horng G, Chen YS, Hong TP (2006) An efficient key-update scheme for wireless sensor networks. In: International conference on computational science. Springer, Berlin/Heidelberg, pp 1026–1029Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.School of Computer and SoftwareNanjing University of Information Science and TechnologyNanjingChina

Section editors and affiliations

  • Haojin Zhu
    • 1
  • Jian Shen
    • 2
  1. 1.Shanghai Jiaotong University, ChinaShanghaiChina
  2. 2.Nanjing University of Information Science & Technology, ChinaNanjingChina