Anonymous ID-based Group Key Agreement scheme applied in Virtual Private Ad Hoc Networks
نویسندگان
چکیده
As more and more mobile devices interconnect through largescale IP networks, new network architectures become important. A Virtual Private Ad Hoc Network (VPAN) provides such an architecture in which network virtualisation and ad hoc networking techniques are combined. A VPAN consists of a distributed set of entities of which the composition can change over time. This dynamic membership is self-organising, meaning that the members need to discover each other. VPAN members have a common trust relationship and those members that are able to connect to each other directly will organise themselves in clusters, which are interconnected through VPAN members that have network (Internet) access. In this paper, we propose an anonymous ID-based group key agreement protocol applied in the VPAN architecture to enhance the privacy of VPAN cluster nodes to the outside world and to lower the encryption overhead within their VPAN cluster. More specifically, VPAN cluster membership is anonymous and unlinkable to other sessions, and common group session keys are agreed upon within each cluster.
منابع مشابه
ID-Based Key Agreement with Anonymity for Ad Hoc Networks
Security support is a must for ad hoc networks. However, existing key agreement schemes for ad hoc networks ignore the issue of entity anonymity. Without anonymity, the adversary can easily identify and track specific entities in the communications. Not only entities’ movement information is valuable to the adversary but also the adversary can launch heavy attacks on those important nodes, base...
متن کاملCryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05
An ad-hoc anonymous identification scheme is a new multiuser cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove membership anonymously in such groups. Recently, Nguyen [11] proposed an ID-based ad-hoc anonymous identification scheme from bilinear pairings. However, in this paper, we propose an attack on Nguyen’s ID-based ad-hoc anonymou...
متن کاملCryptanalysis and improvement of an ID-based ad-hoc anonymous identification
An ad-hoc anonymous identification scheme is a new multiuser cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove membership anonymously in such groups. Recently, Nguyen [11] proposed an ID-based ad-hoc anonymous identification scheme from bilinear pairings. However, in this paper, we propose an attack on Nguyen’s ID-based ad-hoc anonymou...
متن کاملComments on the Lu-Su Authenticated Key Agreement Scheme in Ad hoc Networks
Lu and Su [Comm. Of the CCISA 12(1) (2006) pp.93-104] proposed an authenticated key agreement scheme in Ad hoc Networks. Their scheme based on Shamir’s ID-based cryptosystem and Okamoto’s key distribution system attempts concurrently to achieve two goals: (1) any mobile node A can authenticate the other one B, who is communicating with A, is illegitimate node or not, and (2) A and B can obtain ...
متن کاملEISM: An Efficient ID-based Signcryption Scheme for Multi-PKG Multihop Wireless Networks of Mobile Hosts
Wireless ad hoc networks are self-configurable and autonomous networks and this type of networks serve as a good candidate to provide communications of many novel applications, including mission critical applications, mobile and pervasive computing, etc. Such networks are often composed of computation-constrained or resource-limited devices and without any underlying infrastructure. On the othe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008