A secure authenticated group key agreement protocol for resource-limited mobile devices

Research output: Contribution to journalArticle

35 Citations (Scopus)

Abstract

With rapid growth of mobile wireless networks, many mobile applications have received significant attention. However, security will be an important factor for their full adoption. Most security technologies currently deployed in wired networks are not fully applicable to wireless networks involved in resource-limited mobile nodes because of their low-power computing capability and limited energy. The design of secure group key agreement protocols is one of many important security issues in wireless networks. A group key agreement protocol involves all participants cooperatively establishing a group key, which is used to encrypt/decrypt transmitted messages among participants over an open channel. Unfortunately, most previously proposed group key agreement protocols are too expensive computationally to be employed in mobile wireless networks. Recently, Bresson et al. proposed an authenticated group key agreement protocol suitable for a mobile wireless network. This mobile wireless network is an asymmetric wireless one that consists of many mobile nodes with limited computing capability and a powerful node with less restriction. However, this protocol does not satisfy some important security properties such as forward secrecy and contributory key agreement. In this paper, we propose a new authenticated group key agreement protocol, which is well suited for this asymmetric wireless network. The proposed protocol not only is efficient but also meets strong security requirements. We demonstrate that the proposed protocol is a real contributory group key agreement one and provides forward secrecy as well as implicit key authentication. The proposed protocol is provably secure against passive adversaries and impersonator's attacks. A simulation result shows that the proposed protocol is well suited for mobile devices with limited computing capability.

Original languageEnglish
Pages (from-to)41-52
Number of pages12
JournalComputer Journal
Volume50
Issue number1
DOIs
Publication statusPublished - 2007 Jan 1

Fingerprint

Mobile devices
Wireless networks
Network protocols
Authentication

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Cite this

@article{5f61b3e2c1c4487fac5b738779882e54,
title = "A secure authenticated group key agreement protocol for resource-limited mobile devices",
abstract = "With rapid growth of mobile wireless networks, many mobile applications have received significant attention. However, security will be an important factor for their full adoption. Most security technologies currently deployed in wired networks are not fully applicable to wireless networks involved in resource-limited mobile nodes because of their low-power computing capability and limited energy. The design of secure group key agreement protocols is one of many important security issues in wireless networks. A group key agreement protocol involves all participants cooperatively establishing a group key, which is used to encrypt/decrypt transmitted messages among participants over an open channel. Unfortunately, most previously proposed group key agreement protocols are too expensive computationally to be employed in mobile wireless networks. Recently, Bresson et al. proposed an authenticated group key agreement protocol suitable for a mobile wireless network. This mobile wireless network is an asymmetric wireless one that consists of many mobile nodes with limited computing capability and a powerful node with less restriction. However, this protocol does not satisfy some important security properties such as forward secrecy and contributory key agreement. In this paper, we propose a new authenticated group key agreement protocol, which is well suited for this asymmetric wireless network. The proposed protocol not only is efficient but also meets strong security requirements. We demonstrate that the proposed protocol is a real contributory group key agreement one and provides forward secrecy as well as implicit key authentication. The proposed protocol is provably secure against passive adversaries and impersonator's attacks. A simulation result shows that the proposed protocol is well suited for mobile devices with limited computing capability.",
author = "Yuh-Min Tseng",
year = "2007",
month = "1",
day = "1",
doi = "10.1093/comjnl/bxl043",
language = "English",
volume = "50",
pages = "41--52",
journal = "Computer Journal",
issn = "0010-4620",
publisher = "Oxford University Press",
number = "1",

}

A secure authenticated group key agreement protocol for resource-limited mobile devices. / Tseng, Yuh-Min.

In: Computer Journal, Vol. 50, No. 1, 01.01.2007, p. 41-52.

Research output: Contribution to journalArticle

TY - JOUR

T1 - A secure authenticated group key agreement protocol for resource-limited mobile devices

AU - Tseng, Yuh-Min

PY - 2007/1/1

Y1 - 2007/1/1

N2 - With rapid growth of mobile wireless networks, many mobile applications have received significant attention. However, security will be an important factor for their full adoption. Most security technologies currently deployed in wired networks are not fully applicable to wireless networks involved in resource-limited mobile nodes because of their low-power computing capability and limited energy. The design of secure group key agreement protocols is one of many important security issues in wireless networks. A group key agreement protocol involves all participants cooperatively establishing a group key, which is used to encrypt/decrypt transmitted messages among participants over an open channel. Unfortunately, most previously proposed group key agreement protocols are too expensive computationally to be employed in mobile wireless networks. Recently, Bresson et al. proposed an authenticated group key agreement protocol suitable for a mobile wireless network. This mobile wireless network is an asymmetric wireless one that consists of many mobile nodes with limited computing capability and a powerful node with less restriction. However, this protocol does not satisfy some important security properties such as forward secrecy and contributory key agreement. In this paper, we propose a new authenticated group key agreement protocol, which is well suited for this asymmetric wireless network. The proposed protocol not only is efficient but also meets strong security requirements. We demonstrate that the proposed protocol is a real contributory group key agreement one and provides forward secrecy as well as implicit key authentication. The proposed protocol is provably secure against passive adversaries and impersonator's attacks. A simulation result shows that the proposed protocol is well suited for mobile devices with limited computing capability.

AB - With rapid growth of mobile wireless networks, many mobile applications have received significant attention. However, security will be an important factor for their full adoption. Most security technologies currently deployed in wired networks are not fully applicable to wireless networks involved in resource-limited mobile nodes because of their low-power computing capability and limited energy. The design of secure group key agreement protocols is one of many important security issues in wireless networks. A group key agreement protocol involves all participants cooperatively establishing a group key, which is used to encrypt/decrypt transmitted messages among participants over an open channel. Unfortunately, most previously proposed group key agreement protocols are too expensive computationally to be employed in mobile wireless networks. Recently, Bresson et al. proposed an authenticated group key agreement protocol suitable for a mobile wireless network. This mobile wireless network is an asymmetric wireless one that consists of many mobile nodes with limited computing capability and a powerful node with less restriction. However, this protocol does not satisfy some important security properties such as forward secrecy and contributory key agreement. In this paper, we propose a new authenticated group key agreement protocol, which is well suited for this asymmetric wireless network. The proposed protocol not only is efficient but also meets strong security requirements. We demonstrate that the proposed protocol is a real contributory group key agreement one and provides forward secrecy as well as implicit key authentication. The proposed protocol is provably secure against passive adversaries and impersonator's attacks. A simulation result shows that the proposed protocol is well suited for mobile devices with limited computing capability.

UR - http://www.scopus.com/inward/record.url?scp=33845653685&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33845653685&partnerID=8YFLogxK

U2 - 10.1093/comjnl/bxl043

DO - 10.1093/comjnl/bxl043

M3 - Article

VL - 50

SP - 41

EP - 52

JO - Computer Journal

JF - Computer Journal

SN - 0010-4620

IS - 1

ER -