DocumentCode :
3075394
Title :
Efficient Region -Based Group Key Agreement Protocol for Ad Hoc Networks using Elliptic Curve Cryptography
Author :
Kumar, K. ; Sumathy, V. ; Begum, J. Nafeesa
Author_Institution :
Dept. of CSE, Gov. Coll. of Eng., Bargur
fYear :
2009
fDate :
6-7 March 2009
Firstpage :
1052
Lastpage :
1060
Abstract :
A group key agreement (GKA) protocol is a mechanism to establish a cryptographic key for a group of participants, based on each one´s contribution, over a public network. Security of various group-oriented applications for ad-hoc groups requires a group secret shared between all participants. In ad hoc networks, the movement of the network nodes may quickly change the topology resulting in the increased in e overhead during messaging for topology maintenance, the region based schemes of ad hoc networks therefore aim at handling topology maintenance, managing node movement and reducing overhead. When the group composition changes, group controller can employ supplementary GKA protocols to derive a new key. Thus, they are well-suited to the key establishment needs of dynamic peer-to-peer networks as in ad hoc networks. While many of the proposed GKA protocols are too expensive to be employed by the constrained devices often present in ad hoc networks, others lack a formal security analysis. In this paper, a simple, secure and efficient region based GKA protocol using elliptic curve cryptography well suited to dynamic ad hoc networks is presented. This paper introduces a region-based contributory group key agreement that achieves the performance lower bound by utilizing a novel group elliptic curve Diffie-Hellman (GECDH) protocol and tree-based group elliptic curve Diffle-Hellman (TGECDH) protocol, called GEDH & TGECDH protocol. Both theoretical and simulation studies shows that the proposed scheme achieves much lower communication, computation and memory cost than the existing group Diffie-Hellman and tree based contributory group key agreement schemes.
Keywords :
ad hoc networks; cryptographic protocols; public key cryptography; telecommunication network topology; telecommunication security; trees (mathematics); dynamic ad hoc network; dynamic peer-to-peer network; elliptic curve cryptography; formal security analysis; group elliptic curve Diffie-Hellman protocol; network topology; region-based group key agreement protocol; tree-based group elliptic curve Diffle-Hellman protocol; Ad hoc networks; Computational efficiency; Computer networks; Cryptographic protocols; Educational institutions; Elliptic curve cryptography; Elliptic curves; Government; Network topology; Peer to peer computing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advance Computing Conference, 2009. IACC 2009. IEEE International
Conference_Location :
Patiala
Print_ISBN :
978-1-4244-2927-1
Electronic_ISBN :
978-1-4244-2928-8
Type :
conf
DOI :
10.1109/IADCC.2009.4809160
Filename :
4809160
Link To Document :
بازگشت