A GROUP AUTHENTICATION MODEL FOR WIRELESS NETWORK SERVICES BASED ON GROUP KEY MANAGEMENT
Huy Hoang Ngo, Xianping Wu, Phu Dung Le
2008
Abstract
Group authentication provides authentication for members of communication group between services and users in insecure environments such as wireless networks. Most of the group authentication models do not consider the risk of compromised share secrets in the group under various security threats such as cryptanalysis. Although authentication key exchange in groups can benefit from group key management to minimise this risk, the group key management schemes are inefficient for authentication services. In this paper, a group authentication model for wireless networks services using a group key management is presented. The group key management is specially designed with forward secrecy and session keys for efficient and secure key exchange. Based on this secure session keys, a dynamic group authentication scheme provides a secure and efficient group authentication for wireless network users and services.
References
- Amir, Y., Nita-Rotaru, C., and Stanton, J. R. (2001). Framework for authentication and access control of clientserver group communication systems. Lecture Notes in Computer Science, 2233:128.
- Burrows, M., Abadi, M., and Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1):18-36.
- Challal, Y. and Seba, H. (2005). Group key management protocols: A novel taxonomy. International Journal of Information Technology, 2(1):105-118.
- Damodaran, D., Singh, R., and Le, P. D. (2006). Group key management in wireless networks using session keys. Proceedings of the Third International Conference on Information Technology: New Generations, pages 402-407.
- Dijk, M. V., Gehrmann, C., and Smeets, B. (1998). Unconditionally secure group authentication. Designs, Codes and Cryptography, 14(3):281-296.
- Hanaoka, G., Shikata, J., Hanaoka, Y., and Imai, H. (2002). Unconditionally secure anonymous encryption and group authentication. Lecture Notes In Computer Science, 2501:81-99.
- Handley, B. (2000). Resource-efficient anonymous group identification. Financial Cryptography, 1962:295- 312.
- Jaulmes, E. and Poupard, G. (2002). On the security of homage group authentication protocol. Lecture Notes In Computer Science, 2339:106-116.
- Martucci, L., Carvalho, T., and Ruggiero, W. (2004). A lightweight distributed group authentication mechanism. INC2004 - Fourth International Network Conference, pages 393-400.
- Rafaeli, S. and Hutchinson, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys, 35(3):309-329.
- Rubin, A. D. and Honeyman, P. (1993). Formal methods for the analysis of authentication protocols. (CITI Technical Report 93-7).
- Zwierko, A. and Kotulski, Z. (2005). A new protocol for group authentication providing partial anonymity. Next Generation Internet Networks, pages 356-363.
Paper Citation
in Harvard Style
Hoang Ngo H., Wu X. and Dung Le P. (2008). A GROUP AUTHENTICATION MODEL FOR WIRELESS NETWORK SERVICES BASED ON GROUP KEY MANAGEMENT . In Proceedings of the Tenth International Conference on Enterprise Information Systems - Volume 6: ICEIS, ISBN 978-989-8111-38-8, pages 182-188. DOI: 10.5220/0001687201820188
in Bibtex Style
@conference{iceis08,
author={Huy Hoang Ngo and Xianping Wu and Phu Dung Le},
title={A GROUP AUTHENTICATION MODEL FOR WIRELESS NETWORK SERVICES BASED ON GROUP KEY MANAGEMENT},
booktitle={Proceedings of the Tenth International Conference on Enterprise Information Systems - Volume 6: ICEIS,},
year={2008},
pages={182-188},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001687201820188},
isbn={978-989-8111-38-8},
}
in EndNote Style
TY - CONF
JO - Proceedings of the Tenth International Conference on Enterprise Information Systems - Volume 6: ICEIS,
TI - A GROUP AUTHENTICATION MODEL FOR WIRELESS NETWORK SERVICES BASED ON GROUP KEY MANAGEMENT
SN - 978-989-8111-38-8
AU - Hoang Ngo H.
AU - Wu X.
AU - Dung Le P.
PY - 2008
SP - 182
EP - 188
DO - 10.5220/0001687201820188