The group authentication model is applied to provide
anonymous authentication for the portal. The user is
only required to authenticate to the group key man-
agement at portal once. After that he is allowed to
access the different services from different groups de-
pend on his subscription.
The following table compares the advantages and
disadvantages between
1. this group authentication,
2. Zwierko’s group authentication scheme (Zwierko
and Kotulski, 2005),
3. Damodaran’s group key management for group
authentication (Damodaran et al., 2006), and
4. the traditional individual authentication Kerberos
model in this case study.
Table 1: Comparison between different group models.
1 2 3 4
Anonymity Yes Yes Yes No
Number of Messages 3 6+ 3 6+
GKM Yes No Yes No
Rekey Yes Yes Yes No
The comparison table shows that this group au-
thentication model is more efficient in rekeying and
authentication operations in groups. It is also more
secure by using session keys in every authentication
session. Besides, it also can provides the anonymity
which is very important in wireless networks commu-
nities. In this model, not all processes can provide
services freely to the system. They have to authenti-
cate to the group key management to obtain the right
to provide the services to a certain group. So that an
adult entertainment service cannot provide access to
the users in the normal children entertainment groups.
7 CONCLUSIONS
The paper proposes a group authentication using for-
ward secrecy group key management. The forward
secrecy group key management is used for secure
authentication key exchange. Based on this effi-
cient group key management, the group authentica-
tion protocol uses three messages to provide anony-
mous group authentication for the users and the ser-
vices in the same clusters. Depending on the secu-
rity and efficiency policy of each cluster, the rekey-
ing operation is invoked to renew the previous clus-
ter and group keys. The rekeying operation makes
the group authentication keys become one time ses-
sion group authentication keys. The rekeying process
in group key management can minimise the compro-
mised authentication key risks from security threats.
The authentication model can be applied securely and
efficiently for group of services and users in wireless
networks.
REFERENCES
Amir, Y., Nita-Rotaru, C., and Stanton, J. R. (2001). Frame-
work for authentication and access control of client-
server group communication systems. Lecture Notes
in Computer Science, 2233:128.
Burrows, M., Abadi, M., and Needham, R. (1990). A logic
of authentication. ACM Transactions on Computer
Systems, 8(1):18–36.
Challal, Y. and Seba, H. (2005). Group key management
protocols: A novel taxonomy. International Journal
of Information Technology, 2(1):105–118.
Damodaran, D., Singh, R., and Le, P. D. (2006). Group
key management in wireless networks using session
keys. Proceedings of the Third International Confer-
ence on Information Technology: New Generations,
pages 402–407.
Dijk, M. V., Gehrmann, C., and Smeets, B. (1998). Un-
conditionally secure group authentication. Designs,
Codes and Cryptography, 14(3):281–296.
Hanaoka, G., Shikata, J., Hanaoka, Y., and Imai, H. (2002).
Unconditionally secure anonymous encryption and
group authentication. Lecture Notes In Computer Sci-
ence, 2501:81–99.
Handley, B. (2000). Resource-efficient anonymous group
identification. Financial Cryptography, 1962:295–
312.
Jaulmes, E. and Poupard, G. (2002). On the security of
homage group authentication protocol. Lecture Notes
In Computer Science, 2339:106–116.
Martucci, L., Carvalho, T., and Ruggiero, W. (2004). A
lightweight distributed group authentication mecha-
nism. INC2004 - Fourth International Network Con-
ference, pages 393–400.
Rafaeli, S. and Hutchinson, D. (2003). A survey of key
management for secure group communication. ACM
Computing Surveys, 35(3):309–329.
Rubin, A. D. and Honeyman, P. (1993). Formal methods for
the analysis of authentication protocols. (CITI Tech-
nical Report 93-7).
Zwierko, A. and Kotulski, Z. (2005). A new protocol
for group authentication providing partial anonymity.
Next Generation Internet Networks, pages 356–363.
ICEIS 2008 - International Conference on Enterprise Information Systems
188