View Full Document

A Family of Protocols for Group Key Generation in Ad Hoc Networks



View the full content.
View Full Document
View Full Document

17 views

Unformatted text preview:

A Family of Protocols for Group Key Generation in Ad Hoc Networks Alec Yasinsac Vikram Thakur Stephen Carter Ilkay Cubukcu Computer Science Department Florida State University yasinsac cs fsu edu Abstract With the pervasive distribution of highly mobile computing devices establishing dynamic networks among these mobile nodes is a growing demand This new field of study has come to be known as ad hoc networking Because of the nature of ad hoc networks protecting communication in this environment is difficult with solutions based on cryptographic techniques Most existing group key management techniques are not suited to the ad hoc network environment In this paper we give a family of efficient cryptographic protocols for establishing secure groups in the ad hoc network environment We begin by detailing the foundational protocol based on the Diffie Hellman key exchange and show how this protocol is efficient and secure We go on to give protocols for group join and exclusion and a corresponding set of authenticating group protocols based on our foundational protocol Keywords Cryptographic Protocols Ad Hoc Networking Security Conference Key Establishment Group Keys 1 Introduction Ad hoc networks are a hot research topic The enabling technology for this field includes 1 Reduction in size of chips and the nodes that hold them 2 Dramatic improvements in wireless communication speed bandwidth and reliability Because they can people want to move about freely with their computers turned on and connected Ad hoc networks are a natural result of user demand meeting the enabling technology Highly mobile devices that dynamically organize ad hoc networks intercommunicate pass information to other wireless users and then dissolve characterize ad hoc networks An essential characteristic of ad hoc networks is the ability to dynamically form communications groups The inherently chaotic nature of these groups complicates protecting communications security for these groups There are many



Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view A Family of Protocols for Group Key Generation in Ad Hoc Networks and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view A Family of Protocols for Group Key Generation in Ad Hoc Networks and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?