2021
DOI: 10.1002/int.22544
|View full text |Cite
|
Sign up to set email alerts
|

Group key agreement protocol among terminals of the intelligent information system for mobile edge computing

Abstract: Security communication and information sharing among mobile devices are important application technologies of the intelligent information system (IIS). Because IIS is vulnerable to attacks, so the security of information sharing among mobile devices is seriously threatened. Thence, it is necessary to establish a secure channel for communication among mobile devices of IIS over an opening network. Group key agreement (GKA) can establish a secure channel among mobile devices of IIS by encryption technology. Due … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6

Relationship

3
3

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 34 publications
(46 reference statements)
0
11
0
Order By: Relevance
“…Group key agreement protocol among terminals is proposed in Ref. [19]. This scheme defines the concept of multi‐authorization center identity authentication, which mainly includes three parts: initialization algorithm, key generation algorithm and authentication protocol.…”
Section: Related Workmentioning
confidence: 99%
“…Group key agreement protocol among terminals is proposed in Ref. [19]. This scheme defines the concept of multi‐authorization center identity authentication, which mainly includes three parts: initialization algorithm, key generation algorithm and authentication protocol.…”
Section: Related Workmentioning
confidence: 99%
“…only be deduced after the resetting period, the number of remaining codeword combinations can be determined by (2). This is done by multiplying the number of candidates as well as the average discrimination ratio.…”
Section: Adaptive Mapping Matrixmentioning
confidence: 99%
“…Covert channels can be an effective and efficient means of transmitting confidential information in untrusted IoT networks. [1][2][3] The deployment of Voice over Long Term Evolution (VoLTE) for next-generation audio and video communication over mobile networks has significantly increased the available data rates and quality of service (QoS). [4][5][6] The core network of this technology is a packet-switched network, that is also part of the 5G standard.…”
Section: Introductionmentioning
confidence: 99%
“…It also proposes a specific conversion from AGKA without certificate authentication to AGKA without identity authentication based on session key. Group key agreement among intelligent terminals in intelligent system are proposed in Zhang et al 23,24 A scalable GKA protocol is proposed in Naresh et al 25 The flexible architecture proposed by the protocol not only reduces the process of cryptographic calculations, but also reduces the workload. The protocol adopts a hybrid and hierarchical approach to clusters, and the workload of key update is reduced without affecting other groups.…”
Section: Related Workmentioning
confidence: 99%