Abstract
A security association specifies the cryptographic keys and algorithms to be used for secure communication among the participants in the association. Key agreement in ad hoc scenarios, that is, without key management infrastructure is a challenging task, in particular, if the security association should involve a group of entities. In this paper, existing pairwise ad hoc key agreement protocols are extended for groups of arbitrary number of entities. New protocols based on both passkeys and numeric comparison (short authenticated strings) are presented. Also security properties and group management for these protocols are discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abdalla, M., Bresson, E., Chevassut, O., Pointcheval, D.: Password-based Group Key Exchange in a Constant Number of Rounds. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 427–442. Springer, Heidelberg (2006)
Asokan, N., Ginzboorg, P.: Key Agreement in Ad-hoc Networks. Computer Communications Review 23(17), 1627–1637 (2000)
Balfanz, D., Durfee, G., Grinter, R.E., Smetters, D.K., Stewart, P.: Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute. In: 13th Usenix Security Symposium, San Diego, CA (August 2004)
Bluetooth SIG. Bluetooth Simple Pairing Whitepaper. Technical report, Bluetooth SIG (2006), http://www.bluetooth.com/Bluetooth/Apply/Technology/Research/Simple_Pairing.htm
Bellovin, S.M., Merritt, M.: Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks. In: 1992 IEEE Computer Society Symposium, pp. 72–84 (1992)
Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Proceedings of Network and Distributed System Security Symposium 2002 (NDSS 2002), San Diego, CA (February 2002)
Čagalj, M., Čapkun, S., Hubaux, J.-P.: Key Agreement in Peer-to-Peer Wireless Networks. Proceedings of the IEEE (Special Issue on Security and Cryptography) 92(2), 467–478 (2006)
Dutta, R., Barua, R.: Password-Based Encrypted Group Key Agreement. International Journal of Network Security 3(1), 23–34 (2006)
Diffie, W., Hellman, M.E.: New Directions In Cryptography. IEEE Transactions on Information Theory IT-22, 644–654 (1976)
Digital Signature Standard (DSS) (FIPS PUB 186-2) (February 2000), http://csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf
Gehrmann, C., Mitchell, C.J., Nyberg, K.: Manual Authentication for Wireless Devices. RSA Cryptobytes 7(1) (2004)
Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G., Uzun, E.: Loud And Clear: Human Verifiable Authentication Based on Audio (2006), http://www.ics.uci.edu/~ccsp/lac/LoudAndClear_files/icdcs.pdf
Laur, S., Asokan, N., Nyberg, K.: Efficient Mutual Data Authentication Using Manually Authenticated Strings. Cryptology ePrint Archive, Report 2005/424 (2005), http://eprint.iacr.org/
Lee, S.-M., Hwang, J.Y., Lee, D.H.: Efficient password-based group key exchange. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol. 3184, pp. 191–199. Springer, Heidelberg (2004)
Laur, S., Nyberg, K.: Efficient Mutual Data Authentication Using Manually Authenticated Strings. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol. 4301, pp. 90–107. Springer, Heidelberg (2006)
Pasini, S., Vaudenay, S.: SAS-Based Authenticated Key Agreement. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 395–409. Springer, Heidelberg (2006)
Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless networks. In: Security Protocols, 7th International Workshop Proceedings (1999)
Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman Key Distribution Extended to Group Communication. In: CCS 1996: Proceedings of the 3rd ACM conference on Computer and communications security, pp. 31–37. ACM Press, New York (1996)
Vaudenay, S.: Secure Communications over insecure Channels Based on Short Authenticated Strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 309–326. Springer, Heidelberg (2005)
Association Models Supplement to the Certified Wireless Universal Serial Bus Specification (2006), http://www.usb.org/developers/wusb/wusb_2006_0302.zip
Philip Zimmermann. Zfone homepage (2006), http://www.philzimmermann.com/EN/zfone/index.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Valkonen, J., Asokan, N., Nyberg, K. (2006). Ad Hoc Security Associations for Groups. In: Buttyán, L., Gligor, V.D., Westhoff, D. (eds) Security and Privacy in Ad-Hoc and Sensor Networks. ESAS 2006. Lecture Notes in Computer Science, vol 4357. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11964254_14
Download citation
DOI: https://doi.org/10.1007/11964254_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69172-3
Online ISBN: 978-3-540-69173-0
eBook Packages: Computer ScienceComputer Science (R0)