Abstract
Mobile communication has become more pervasive and it is considered as one of main concerns of IP telephony, video conferencing, multi-user games and etc. in mobile environments. These applications require secure group communication between a multitude of mobile devices owned by group members. Most of the published group key agreement protocols are based on a model which consists of a stationary base station and a cluster of mobile devices. In this paper, we assume a more realistic scenario in which secret group key is established between several base stations and mobile devices in different cells. We present new group key protocol among mobile devices in different cells and analyze its security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Asokan, N., Ginzboorg, P.: Key Agreement in Ad-hoc Networks, Expanded version of a talk given at the Nordsec 1999 workshop, (Februry 2000)
Bresson, E., Chevassut, O., Essiari, A., Pointcheval, D.: Mutual Authentication and Group Key Agreement for Low-Power Mobile Devices. In: International Conference on Mobile and Wireless Communications Networks. LNCS, vol. 1514, pp. 59–62. Springer, Heidelberg (2003)
Bresson, E., Chevassut, O., Pointcheval, D.: Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 497–514. Springer, Heidelberg (2002)
Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)
Borisov, N., Goldberg, I., Wagner, D.: Intercepting Mobile Communications: The Insecurity of 802.11. In: ACM MobiCom 2001 (2001)
Carroll, C., Frankel, Y., Tsiounis, Y.: Efficient key distribution for slow computing devices: Achieving fast over-the-air activation for wireless systems. In: IEEE Symposium on Security and Privacy (S&P 1998), Oakland, CA, May 3-6 (1998)
Ingemarsson, I., Tang, D.T., Wong, C.K.: A conference key distribution system. IEEE Transactions on Information Theory IT-28(5), 714–720 (1982)
Nam, J., Kim, S., Won, D.: A Weakness in the Bresson-Chevassut-Essiari-Pointcheval. IEEE Communications Letters 9(5), 429–431 (2005)
Nam, J., Lee, J., Kim, S., Won, D.: DDH-based Group Key Agreement in a Mobile Environment. Journal of Systems and Software 78(1), 73–83 (2005)
Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman Key Distribution Extended to Group Communication. In: Proc. of the 3rd ACM Conference on Computer and Communication Security(CCS 1996), March 1996, pp. 31–37 (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, J., Kim, S., Chun, K., Lee, J., Won, D. (2006). Group Key Agreement Protocol Among Mobile Devices in Different Cells. In: Min, G., Di Martino, B., Yang, L.T., Guo, M., Rünger, G. (eds) Frontiers of High Performance Computing and Networking – ISPA 2006 Workshops. ISPA 2006. Lecture Notes in Computer Science, vol 4331. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11942634_112
Download citation
DOI: https://doi.org/10.1007/11942634_112
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49860-5
Online ISBN: 978-3-540-49862-9
eBook Packages: Computer ScienceComputer Science (R0)