Certificateless authenticated group key agreement protocol for unbalanced wireless mobile networks

Chung Fu Lu*, Tzong Chen Wu, Chien Lung Hsu

*Corresponding author for this work

Research output: Contribution to journalJournal Article peer-review

4 Scopus citations

Abstract

In 2004, Bresson et al. proposed a mutual authentication and group key agreement protocol for unbalanced wireless networks. Tseng recently proposed a novel secure protocol to improve Bresson et al.'s protocol. However, both protocols are based on certificate-based public key systems and insecure against the so-called impersonation attacks. They might be unsuitable for unbalanced wireless mobile networks from the viewpoints of security, computational complexities, and communication overheads. This paper proposes a certificateless authenticated group key agreement (cAGKA) protocol based on elliptic curve discrete logarithms. The proposed cAGKA protocol is more secure and efficient than previously proposed protocols for unbalanced wireless mobile networks due to the following facts: (i) The entity authentication and the authenticity of the intended public keys can be simultaneously verified in a logically single step without requiring any public key certificates. (ii) Bit sizes of the keys and the related messages are relatively smaller than those of the previously proposed protocols for the same security level. (iii) It saves the required communication overheads, and computational complexities. (iv) It achieves mutual authentication, impersonation attack resistance, explicit key confirmation, forward secrecy, contributory key agreement, and group key updating.

Original languageEnglish
Pages (from-to)1145-1159
Number of pages15
JournalWSEAS Transactions on Communications
Volume8
Issue number11
StatePublished - 2009
Externally publishedYes

Keywords

  • Certificateless
  • Elliptic curve
  • Group key agreement
  • Implicitlycertified
  • Unbalanced wireless networks

Fingerprint

Dive into the research topics of 'Certificateless authenticated group key agreement protocol for unbalanced wireless mobile networks'. Together they form a unique fingerprint.

Cite this