Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks
DOI: 10.1109/wowmom.2005.26
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Group Key Agreement Protocol for Ad Hoc Networks

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(10 citation statements)
references
References 14 publications
(22 reference statements)
0
10
0
Order By: Relevance
“…The proposed key generation method includes multiple phases that can be organized according to the context in which the WSN is implemented. To implement this functionality, we consider the group Diffie-Hellman key exchange protocol introduced in [19]. 3.…”
Section: Proposed Security Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…The proposed key generation method includes multiple phases that can be organized according to the context in which the WSN is implemented. To implement this functionality, we consider the group Diffie-Hellman key exchange protocol introduced in [19]. 3.…”
Section: Proposed Security Architecturementioning
confidence: 99%
“…When all those messages have been exchanged, the sensors and the core node are authenticated using their private keys. The method used to establish this key is derived from the Diffie-Hellman key agreement protocol [20] and the work of Augot et al [19] which presents a method to generate a key for a group. Initially, all the nodes agree on a cyclic group G and on two numbers p and g, where p is a prime number and g is a primitive root modulo p. The nodes have also a predeployed value S which is secret and known only by the trusted sensors.…”
Section: Initial and Authentication Exchangesmentioning
confidence: 99%
“…And the new key is g r * 10 (1+r * 1 +r 2 +r 4 +r 5 +r 9 ) . 3 The group leader can be different from the initiator; see Section 4.2 for leader election issues.…”
Section: Join/mergementioning
confidence: 99%
“…In fact, many cryptographic protocols for peer-to-peer ad hoc networks, most notably, group key agreement protocols [3,4,20], also make this assumption. This can be justified by relying on reliable group communication services, such as [17,18].…”
Section: System Assumptionsmentioning
confidence: 99%