作者: Junghyun Nam , Kwangwoo Lee , Juryon Paik , Woojin Paik , Dongho Won
DOI: 10.1007/978-3-642-21898-9_11
关键词: Key-agreement protocol 、 Mobile ad hoc network 、 The Internet 、 Link Control Protocol 、 Internet layer 、 Computer security 、 Group Domain of Interpretation 、 Oakley protocol 、 Computer network 、 Wireless Routing Protocol 、 Secure multicast 、 Computer science 、 Provable security 、 Universal composability 、 Security association 、 Resource Reservation Protocol 、 Otway–Rees protocol 、 Optimized Link State Routing Protocol 、 Session key
摘要: A group key exchange (GKE) protocol is designed to allow a of parties communicating over public network establish common secret called session key. As group-oriented applications gain popularity the Internet, number GKE protocols have been suggested provide those with secure multicast channel. Among many presented by Dutta and Dowling for mobile ad hoc networks. In this paper, we are concerned security Dutta-Dowling protocol. Their carries proof in standard adversarial model which captures unknown key-share attacks. But unlike claim provable security, fails achieve resilience. We here reveal vulnerability show how address it.