Open Access Open Access  Restricted Access Subscription or Fee Access

Novel Multicast Key Authentication Protocol

S. Sasikala Devi, Dr.Antony Selvadoss Thanamani

Abstract


Efficient key distribution is an important problem for secure group communications in wireless networks. The Authentication is a vital requirement process in order to prevent intruders attack  prior to the key distribution and exchange process in  multicast key distribution. In this paper, we propose a new multicast key Authentication key transfer protocol based on MDS scheme that ensures secure distributed Standard authentication scheme. Instead of using conventional encryption algorithms, the scheme employs MDS codes, a class of error control codes, to distribute multicast key dynamically. This scheme drastically reduces the Authentication load of each group member compared to existing schemes employing traditional encryption algorithms. Such a scheme is desirable for many wireless applications where portable devices or sensors need to reduce their Authentication as much as possible due to battery power limitations. Easily combined with PFMH key-tree-based schemes, this scheme provides much lower Authentication complexity while maintaining low and balanced communication complexity and storage complexity for secure dynamic multicast key distribution.

Keywords


Key Authentication, MDS Codes, PFMH Tree, PACK.

Full Text:

PDF

References


C. Asmuth and J. Bloom. A modular approach to key safeguarding. Information Theory, IEEE Transactions on, 29(2):208 – 210, mar 1983.

Adi Shamir. How to share a secret. Commun. ACM, 22:612–613, November 1979.

Sorin Iftene. Secret sharing schemes with applications in security protocols. Sci. Ann. Cuza Univ., 16:63–96, 2006.

Li Qiong, Wang Zhifang, Niu Xiamu, and Sun Shenghe. A noninteractive modular verifiable secret sharing scheme. In Communications,Circuits and Systems, 2005. Proceedings. 2005 International Conference on, volume 1, pages 84 – 87 Vol. 1, may 2005.

L. Harn and C. Lin. Detection and identification of cheaters in (t, n) secret sharing scheme. Designs, Codes and Cryptography, 52(1):15–24, 2009.

K. Kaya and A. Selc¸uk. A verifiable secret sharing scheme based on the chinese remainder theorem. Progress in Cryptology-INDOCRYPT 2008, pages 414–425, 2008.

Lidong Zhou and Z.J. Haas. Securing ad hoc networks. Network, IEEE, 13(6):24 –30, nov/dec 1999.

Cohen Benaloh. Secret sharing homomorphisms: Keeping shares of a secret secret (extended abstract). In CRYPTO: Proceedings of Crypto, 1986.

L. Ertaul and N. Chavan. Security of ad hoc networks and threshold cryptography. In Wireless networks, Communications and Mobile Computing, 2005 International Conference on, volume 1, pages 69–74. IEEE, 2005.

Xiong Yan, Miao Fuyou, Zhang Weichao, and WANG Xingfu. Distributed authentication based on multi-hop signing with encrypted signature functions in mobile ad hoc networks. Acta Electronica Sinica, Dependable Sec. Comput, 7(2):189–202, 2010.

T. Sander and C. Tschudin. Protecting mobile agents against malicious hosts. Mobile agents and security, pages 44–60, 1998.

R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold dss signatures. In Advances in CryptologyłEUROCRYPT96, pages 354–371. Springer, 1996.

J.H. Park, E.Y. Park, S.J. Moon, D.H. Choi, Y.S. Kang, and J.C. Ha. Fault resistant crt-rsa scheme adopting a small exponent. In Computer Sciences and Convergence Information Technology (ICCIT), 2010 5th International Conference on, pages 544–549. IEEE, 2010.

Ernie Brickell, Jan Camenisch, and Liqun Chen. Direct anonymous attestation. In Proceedings of the 11th ACM conference on Computer and communications security, CCS ’04, pages 132–145, New York, NY, USA, 2004. ACM.

Liqun Chen, Hans L¨ohr, Mark Manulis, and Ahmad-Reza Sadeghi. Property-based attestation without a trusted third party. In Tzong-Chen Wu, Chin-Laung Lei, Vincent Rijmen, and Der-Tsai Lee, editors, ISC, volume 5222 of Lecture Notes in Computer Science, pages 31–46. Springer, 2008.

Yanjiang Yang, Yingjiu Li, Robert H. Deng, and Feng Bao. Shifting inference control to user side: Architecture and protocol. IEEE Trans.

Wenchao Huang, Yan Xiong, and Depin Chen. Daaodv: A secure adhoc routing protocol based on direct anonymous attestation. In Proc.

Int. Conf. Computational Science and Engineering CSE ’09, volume 2, pages 809–816, 2009.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.