Key Agreement (key + agreement)

Distribution by Scientific Domains


Selected Abstracts


TK-AKA: using temporary key on Authentication and Key Agreement protocol on UMTS

INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, Issue 4 2009
Hsia-Hung Ou
Mobile communication is definitely one of the major high-technology applications that offer present-day people a modern life of appropriate convenience. In recent years, the third-generation cell phone system has approached maturity. The Universal Mobile Telecommunication System (UMTS) is currently the most widely used system around the world. The Third Generation Partnership Project is equipped with the Authentication and Key Agreement (AKA) protocol to maintain secrecy and security both during the authentication process and during the telecommunication session through UMTS. However, Hung and Li have pointed out that the UMTS-AKA protocol has three problems, involving bandwidth consumption, space overhead and synchronization of the sequence number, which are yet to be resolved. In addition, they have proposed an extension of the UMTS-AKA protocol, named the X-AKA protocol, to overcome these obstacles. Nevertheless, the X-AKA protocol too appears to have problems of its own. In this article, the weaknesses of X-AKA are enumerated. In addition, a more practical AKA protocol for UMTS is presented. The new protocol, based on the same framework as its predecessor, proves to be more efficient and practical, satisfying the requirements of modern living. Copyright © 2008 John Wiley & Sons, Ltd. [source]


An efficient dynamic group key agreement protocol for imbalanced wireless networks

INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, Issue 4 2010
Yun-Hsin Chuang
Owing to the popularity of wireless networks, the group key agreement (GKA) design is critical for providing secure group communications over an insecure wireless channel. In 2005, Nam et al. proposed a GKA protocol for imbalanced wireless networks in which an imbalanced wireless network consists of many mobile nodes with limited computing capability and a powerful node with less restriction. In 2007, Tseng showed that Nam et al.'s protocol is not a contributory GKA, while he also proposed a new GKA protocol. However, neither GKA protocol is concerned with dynamic member joining/leaving. This is an important functionality of GKA, especially for a wireless network environment. In this paper, we propose a dynamic group key agreement protocol for imbalanced wireless networks, and show that it requires less computation cost for dynamic member joining/leaving as compared to the previously proposed protocols. We also show that the proposed protocol is provably secure against passive attacks under the decision Diffie,Hellman problem and the hash function assumptions. Furthermore, by the pre-shared two-party key between a mobile node and the powerful node in the existing imbalanced wireless networks, we propose a generalized GKA protocol that requires only several hash functions. Copyright © 2010 John Wiley & Sons, Ltd. [source]


A heterogeneous-network aided public-key management scheme for mobile ad hoc networks

INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, Issue 1 2007
Yuh-Min Tseng
A mobile ad hoc network does not require fixed infrastructure to construct connections among nodes. Due to the particular characteristics of mobile ad hoc networks, most existing secure protocols in wired networks do not meet the security requirements for mobile ad hoc networks. Most secure protocols in mobile ad hoc networks, such as secure routing, key agreement and secure group communication protocols, assume that all nodes must have pre-shared a secret, or pre-obtained public-key certificates before joining the network. However, this assumption has a practical weakness for some emergency applications, because some nodes without pre-obtained certificates will be unable to join the network. In this paper, a heterogeneous-network aided public-key management scheme for mobile ad hoc networks is proposed to remedy this weakness. Several heterogeneous networks (such as satellite, unmanned aerial vehicle, or cellular networks) provide wider service areas and ubiquitous connectivity. We adopt these wide-covered heterogeneous networks to design a secure certificate distribution scheme that allows a mobile node without a pre-obtained certificate to instantly get a certificate using the communication channel constructed by these wide-covered heterogeneous networks. Therefore, this scheme enhances the security infrastructure of public key management for mobile ad hoc networks. Copyright © 2006 John Wiley & Sons, Ltd. [source]


Advanced IMS client supporting secure signaling

BELL LABS TECHNICAL JOURNAL, Issue 4 2008
Ramana Isukapalli
With recent advances in core and access networks and the availability of increased bandwidth and sophisticated devices for end users, there is an increased demand for client applications running on mobile devices, such as laptops and handheld devices, to support real time applications like Voice over Internet Protocol (VoIP) and streaming video, apart from traditional applications like web browsing. This paper presents a prototype IP Multimedia Subsystem (IMS) client, which serves as a VoIP client to set up calls between Internet Protocol (IP) devices and interworks with circuit-switched networks to deliver calls to public switched telephone network (PSTN) phones. It implements supplementary services (including call waiting, call transfer, and call forwarding); supports multimedia ringing, short message service/multimedia messaging service (SMS/MMS), audio/video conferencing, and peer-to-peer video; and it can deliver a call to a user (as opposed to a device) by simultaneously ringing multiple devices registered by the user. Further, to address various security concerns, the client supports Hypertext Transfer Protocol (HTTP) digest authentication using Message Digest 5 (MD5) cryptographic function authentication and key agreement (AKA) and can create secure tunnels to the core network using IP security (IPsec). © 2008 Alcatel-Lucent. [source]