Different key establishment for secure end-to-end communications in Ad-hoc networks

Haksup Shim, Hyoyoung Han, Sang-Geun Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The existing group key establishment protocols can not support end-to-end security in the group, and execute the whole re-keying when lost. Moreover, sharing one same key with all members is unfit to ad hoc networks. For overcoming the problems, this paper proposes Diff-key: Different key establishment based on trust-level. The Diff-key, distinguishes all members into two types of trust-level: trust member and un-trust member. Only trust members can establish a group key, and the others make use of a session key through mutual authentication. Therefore, the Diff-key can achieve end-to-end security services and execute partial re-keying when a key is stolen.

Original languageEnglish
Title of host publicationProceedings of the Fifteenth IASTED International Conference on Parallel and Distributed Computing and Sytems
EditorsT. Gonzalez
Pages500-505
Number of pages6
Edition1
Publication statusPublished - 2003 Dec 1
EventProceedings of the Fifteenth IASTED International Conference on Parallel and Distributed Computing and Systems - Marina del Rey, CA, United States
Duration: 2003 Nov 32003 Nov 5

Publication series

NameProceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems
Number1
Volume15

Other

OtherProceedings of the Fifteenth IASTED International Conference on Parallel and Distributed Computing and Systems
CountryUnited States
CityMarina del Rey, CA
Period03/11/303/11/5

Keywords

  • Ad-hoc network
  • End-to-end
  • Group key
  • Trust-level

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Different key establishment for secure end-to-end communications in Ad-hoc networks'. Together they form a unique fingerprint.

  • Cite this

    Shim, H., Han, H., & Lee, S-G. (2003). Different key establishment for secure end-to-end communications in Ad-hoc networks. In T. Gonzalez (Ed.), Proceedings of the Fifteenth IASTED International Conference on Parallel and Distributed Computing and Sytems (1 ed., pp. 500-505). (Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems; Vol. 15, No. 1).