SECURE GROUP AUTHENTICATION AND KEY DISTRIBUTION IN AD HOC NETWORKS
Chen Liu , Department of Mathematics and Physics, Fujian University of Technology Fuzhou, Fujian, ChinaAbstract
Ad hoc networks present unique challenges in ensuring secure communication due to their dynamic and decentralized nature. Group authentication and key distribution are critical aspects for establishing secure communication among nodes in these networks. This paper explores various strategies and protocols designed to address these challenges effectively. Firstly, we discuss the importance of group authentication mechanisms that verify the identities of multiple nodes simultaneously to prevent unauthorized access and ensure trust within the network. Next, we delve into key distribution techniques tailored for ad hoc environments, emphasizing scalability, resilience to node mobility, and resistance to various attacks. Furthermore, we evaluate existing protocols, such as decentralized group key management schemes and distributed trust models, highlighting their strengths and weaknesses in real-world scenarios. Additionally, we propose enhancements and optimizations to improve the efficiency and security of these protocols.
Keywords
Ad Hoc Networks, Group Authentication, Key Distribution
References
C. Asmuth and J. Bloom, “A modular approach to key safeguarding,” IEEE Transactions on Information Theory, vol. IT-29, no. 2, pp. 208-210, 1983.
A. K. Awasthi and S. Lal, “A remote user authentication scheme using smart cards with forward secrecy,” IEEE Transactions on Consumer Electronics, vol. 49, no. 4, pp. 1246-1248, Nov. 2003.
B. Bruhadeshwar and S. S. Kulkarni, “Balancing revocation and storage trade-offs in secure group communication,” IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 1, pp. 58-73, Feb. 2011.
D. Boneh, X. Boyen, E. J. Goh, “Hierarchical identity based encryption with constant size ciphertext,” in Proceedings of EUROCRYPT 2005, Aarhus, Denmark, pp. 440-456, May, 2005.
C. Boyd, “On key agreement and conference key agreement,” in Proceedings of Second Australasian Conference on Information Security and Privacy, Sydney, Australia, pp. 294-302, July 1997.
C. Gentry and Z. Ramzan, “Identity-based aggregate signatures,” in Proceedings on 9th International Conference on Theory and Practice in Public-Key Cryptography (PKC’2006), New York, USA, vol. 3958, pp. 257-273, Apr. 2006.
L. Harn, “Group authentication,” IEEE Transactions on Computers, vol. 62, no. 9, pp. 1893-1898, 2013.
D. He, J. Chen and J. Hu, “A pairing-free certificateless authenticated key agreement protocol,” International Journal of Communication Systems, vol. 25, no. 2, pp. 221-230, 2012.
S. K. H. Islam and G. P. Biswas, “Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings,” Journal of King Saud University - Computer and Information Sciences, vol. 26, no. 1, pp. 89-97, Jan. 2014.
C. T. Li, M. S. Hwang and Y. P. Chu, “An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor networks”, International Journal of Innovative Computing, Information and Control, vol. 5, no. 8, pp. 2107-2124, Aug. 2009.
C. T. Li, M. S. Hwang, “A lightweight anonymous routing protocol without public key en/decryptions for wireless Ad hoc networks”, Information Sciences, vol. 181, no. 23, pp. 5333V5347, Dec. 2011.
Y. J. Liu, L. Harn and C. C. Chang, “An authenticated group key distribution mechanism using theory of numbers,” International Journal of Communication Systems, vol. 27, no. 11, pp. 3502-3512, Nov.2014.
W. Mao, Modern Cryptography: Theory and Practice, Publishing House of Electronic Industry, Beijing, China, 2004.
S. A. E. Mohamed, “Secure position verification approach for wireless Ad-hoc networks,” International Journal of Network Security, vol. 15, no. 4, pp. 248-255, July 2013.
J. Nam, Y. Lee, S. Kim and D. Won, “Security weakness in a three-party pairing-based protocol for password authenticated key exchange,” Information Sciences, vol. 177, no. 6, pp. 1364-1375, Mar. 2007.
P. Sakarindr and N. Ansari, “Survey of security services on group communications,” IET Information Security, vol. 4, no. 4, pp. 258-272, Dec. 2010.
A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
A. Shamir, “Identity based cryptosystems and signature schemes,” in Proceedings of CRYPTO’84 on Advances in Cryptology, Santa Barbara, California, U.S.A., vol. 196, pp. 47-53, Aug. 1984.
Article Statistics
Downloads
Copyright License
Copyright (c) 2024 Chen Liu
This work is licensed under a Creative Commons Attribution 4.0 International License.