TY - GEN
T1 - Security improvements to anonymous ID-based group key agreement for wireless networks
AU - Teo, Joseph Chee Ming
AU - Choo, Kim Kwang Raymond
PY - 2010
Y1 - 2010
N2 - Group key agreement (GKA) protocols are used to secure group communications in wireless networks but most current GKA protocols do not consider privacy protection. GKA protocols for wireless networks should also handle dynamic group membership events such as user join and leave events. The Join and Leave Protocols provide backward and forward secrecy respectively, that is, the Join Protocol must ensure that a new user cannot obtain the previously established group key(s) and access the corresponding group communications (backward secrecy) while the Leave Protocol must ensure that a leaving user cannot obtain subsequent group key(s) and access new group communications (forward secrecy). Most recently, Wan et al proposed three anonymous ID-based GKA protocols, namely Initial GKA, Join and Leave Protocol, for wireless networks. We first show in this paper that their proposed Join and Leave Protocols do not provide backward and forward secrecy (as claimed) respectively. We also highlight the anonymity issues in their Join and Leave Protocols. We then propose three improved anonymous ID-based GKA protocols (Initial GKA, Join and Leave Protocol).
AB - Group key agreement (GKA) protocols are used to secure group communications in wireless networks but most current GKA protocols do not consider privacy protection. GKA protocols for wireless networks should also handle dynamic group membership events such as user join and leave events. The Join and Leave Protocols provide backward and forward secrecy respectively, that is, the Join Protocol must ensure that a new user cannot obtain the previously established group key(s) and access the corresponding group communications (backward secrecy) while the Leave Protocol must ensure that a leaving user cannot obtain subsequent group key(s) and access new group communications (forward secrecy). Most recently, Wan et al proposed three anonymous ID-based GKA protocols, namely Initial GKA, Join and Leave Protocol, for wireless networks. We first show in this paper that their proposed Join and Leave Protocols do not provide backward and forward secrecy (as claimed) respectively. We also highlight the anonymity issues in their Join and Leave Protocols. We then propose three improved anonymous ID-based GKA protocols (Initial GKA, Join and Leave Protocol).
KW - Anonymity
KW - Dynamic group key agreement
KW - Privacy
KW - Secure group communication
KW - Security analysis
UR - http://www.scopus.com/inward/record.url?scp=77955302767&partnerID=8YFLogxK
U2 - 10.1109/ITNG.2010.115
DO - 10.1109/ITNG.2010.115
M3 - Conference contribution
SN - 9780769539843
T3 - ITNG2010 - 7th International Conference on Information Technology: New Generations
SP - 732
EP - 737
BT - ITNG2010 - 7th International Conference on Information Technology
T2 - 7th International Conference on Information Technology - New Generations, ITNG 2010
Y2 - 12 April 2010 through 14 April 2010
ER -