Abstract
Mobile ad-hoc networks are emerging as important computing platforms, and their users expect the security to be comparable to fixed, infrastructural networks. With the increase of group-oriented applications, secure communication has to be provided between a group of nodes that may join and leave the network in an unplanned manner. Previous solutions have achieved limited success, for example did not provide manageable confidentiality of messages. This paper proposes a fast, scalable group encryption key model that is suitable for ad-hoc networks and is resistant against multiple compromised nodes.
Chapter PDF
Reference
T. Aura and S. Mäki. Towards a survivable security architecture for ad-hoc networks. In Security Protocols, volume 2467, pages 63–73. Springer-Verlag Heidelberg, Lecture Notes in Computer Science, 2002.
S. Čapkun, L. Buttyán and J.P. Hubaux. Self-organised public-key management for mobile ad hoc networks, IEEE Transactions on Mobile Computing, 2(1):52–64, Jan–Mar 2003.
Y. Dodis, J. Katz, S. Xu, and M. Yung. Key-insulated public key cryptosystems. In Advances in Cryptology-EUROCRYPT 2002, volume 2332. Springer-Verlag Heidelberg, Lecture Notes in Computer Science, April 2002.
Y. Dodis, J. Katz, S. Xu, and M. Yung. Strong key-insulated signature schemes. In Workshop on Public Key Cryptography (PKC), volume 2567. Springer-Verlag Heidelberg, Lecture Notes in Computer Science, January 2003.
Y. Frankel, P. Gemmell, P. D. MacKenzie, and M. Yung. Proactive RSA. In Advances in Cryptology-CRYTPTO 1997, volume 1294, pages 440–454. Springer-Verlag, Heidelberg, Lecture Notes in Computer Science, 1997
S. Kaliaperumal. Securing authentication and privacy in ad hoc partitioned networks. In Symposium on Applications and the Internet Workshops (SAINT’03 Workshops), pages 354–357, Orlando, FL, January 2003.
Y. Kim, A. Perrig, and G. Tsudik. Group key agreement efficient in communication. Computers, IEEE Transactions on, 53(7):905–921, July 2004.
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing robust and ubiquitous secunity support for mobile ad hoc networks. In IEEE 9th International Conference on Network Protocols (ICNP’ 01), 2001.
H. Luo and S. Lu. Ubiquitous and robust authentication services for ad hoc wireless networks. UCLA Computer Science Technical Report, 200030, October 2000.
H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang. Self securing ad hoc networks. In Proceedings Seventh International Symposium on Computers and Communications (ISCC 2002), pages 567–574, July 2002.
A. Menezes, P. van Oorschot, and S. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997.
K. Obraczka, K. Viswanath, and G. Tsudik. Flooding for reliable multicast in multi-hop ad hoc networks. Wireless Networks, 7(6):527–634, November 2001.
Lidong Zhou and Zygmunt J. Haas. Securing ad hoc networks. Network, IEEE, 13(6):24–30, Nov–Dec 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this paper
Cite this paper
Sundaram, S., Bertok, P., Burton, B. (2005). Secure Group Communication with Distributed Generation of Private Keys for Ad-Hoc Networks. In: Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds) Security and Privacy in the Age of Ubiquitous Computing. SEC 2005. IFIP Advances in Information and Communication Technology, vol 181. Springer, Boston, MA. https://doi.org/10.1007/0-387-25660-1_31
Download citation
DOI: https://doi.org/10.1007/0-387-25660-1_31
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-25658-0
Online ISBN: 978-0-387-25660-3
eBook Packages: Computer ScienceComputer Science (R0)