Security Improvement on a Group Key Exchange Protocol for Mobile Networks

作者: Junghyun Nam , Kwangwoo Lee , Juryon Paik , Woojin Paik , Dongho Won

DOI: 10.1007/978-3-642-21898-9_11

关键词: Key-agreement protocolMobile ad hoc networkThe InternetLink Control ProtocolInternet layerComputer securityGroup Domain of InterpretationOakley protocolComputer networkWireless Routing ProtocolSecure multicastComputer scienceProvable securityUniversal composabilitySecurity associationResource Reservation ProtocolOtway–Rees protocolOptimized Link State Routing ProtocolSession key

摘要: A group key exchange (GKE) protocol is designed to allow a of parties communicating over public network establish common secret called session key. As group-oriented applications gain popularity the Internet, number GKE protocols have been suggested provide those with secure multicast channel. Among many presented by Dutta and Dowling for mobile ad hoc networks. In this paper, we are concerned security Dutta-Dowling protocol. Their carries proof in standard adversarial model which captures unknown key-share attacks. But unlike claim provable security, fails achieve resilience. We here reveal vulnerability show how address it.

参考文章(21)
Simon Blake-Wilson, Alfred Menezes, Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol public key cryptography. pp. 154- 170 ,(1999) , 10.1007/3-540-49162-7_12
Aggelos Kiayias, Moti Yung, Traitor Tracing with Constant Transmission Rate international cryptology conference. pp. 450- 465 ,(2002) , 10.1007/3-540-46035-7_30
Jonathan Katz, Moti Yung, Scalable Protocols for Authenticated Group Key Exchange Advances in Cryptology - CRYPTO 2003. pp. 110- 125 ,(2003) , 10.1007/978-3-540-45146-4_7
Burton S. Kaliski, An unknown key-share attack on the MQV key agreement protocol ACM Transactions on Information and System Security. ,vol. 4, pp. 275- 288 ,(2001) , 10.1145/501978.501981
D. Johnston, J. Walker, Overview of IEEE 802.16 security ieee symposium on security and privacy. ,vol. 2, pp. 40- 48 ,(2004) , 10.1109/MSP.2004.20
Whitfield Diffie, Paul C. Van Oorschot, Michael J. Wiener, Authentication and authenticated key exchanges Designs, Codes and Cryptography. ,vol. 2, pp. 107- 125 ,(1992) , 10.1007/BF00124891
Jonathan Katz, Ji Sun Shin, Modeling insider attacks on group key-exchange protocols Proceedings of the 12th ACM conference on Computer and communications security - CCS '05. pp. 180- 189 ,(2005) , 10.1145/1102120.1102146
Nikita Borisov, Ian Goldberg, David Wagner, Intercepting mobile communications Proceedings of the 7th annual international conference on Mobile computing and networking - MobiCom '01. pp. 180- 189 ,(2001) , 10.1145/381677.381695
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland, On Session Identifiers in Provably Secure Protocols Security in Communication Networks. pp. 351- 366 ,(2005) , 10.1007/978-3-540-30598-9_25
S.-L. Ng, C. Mitchell, Comments on mutual authentication and key exchange protocols for low power wireless communications IEEE Communications Letters. ,vol. 8, pp. 262- 263 ,(2004) , 10.1109/LCOMM.2004.825724