SECURE KEY EXCHANGE AND ENCRYPTION FOR GROUP COMMUNICATION IN WIRELESS ADHOC NETWOR
#1

[attachment=5221]

SECURE KEY EXCHANGE AND ENCRYPTION
FOR GROUP COMMUNICATION IN
WIRELESS ADHOC NETWORKS



ABSTRACT

Ad hoc wireless networks is primarily important, because the communication
signals are openly available as they propagate through air and are more susceptible to attacks ranging from passive eavesdropping to active interfering. The lack of any central coordination and shared wireless medium makes them more vulnerable to attacks than wired networks. Nodes act both as hosts and routers and are interconnected by Multi- hop communication path for forwarding and receiving packets to/from other nodes. The objective of this paper is to propose a key exchange and encryption mechanism that aims to use the MAC address as an additional parameter as the message specific key[to encrypt]and forward data among the nodes. The nodes are organized in spanning tree fashion, as they avoid forming cycles and exchange of key occurs only with authenticated neighbors in ad hoc networks, where nodes join or leave the network dynamically.
Ad hoc wireless networks are defined as the category of wireless networks that
utilize multi-hop radio relaying and are capable of operating without the support of any fixed infrastructure and nodes communicate directly between one another over wireless channels . As the wireless channels are openly available and propagate through the air, security in ad hoc networks is of primary concern . In an ad hoc wireless network, the routing and resource management are done in a distributed manner in which all nodes coordinate to enable communication among them as a group. This requires each node to be more intelligent so that it can function both as a network host for transmitting and receiving data and as a network router for routing packets from other nodes. As ad hoc networks significantly vary from each other in many aspects, an environment-specific and efficient key management system is needed.
Reply
#2
Shocked 
[attachment=6198]
This article is presented by:Hui-Feng Huang and Yi-Jia Chang
Graduate School of Computer Science and Information Technology
National Taichung Institute of Technology
An Efficient Three Party Authenticated Key Exchange for Mobile Communications


ABSTRACT
In three-party password based key exchange protocol, a client is allowed to share a human-memorable password with a trusted server such that two clients can negotiate a session key to communicate with each other secretly. Recently, many three-party password based key exchange protocols have been developed. However, these proposed schemes cannot simultaneously achieve security and efficiency. Based on elliptic curve cryptography (ECC), this article will propose a new three-party password based authenticated key exchange scheme. The proposed method not only reduces computation cost for remote users and a trusted server but also is more efficient than previously proposed schemes. It is very suitable for hardware-limited users such as mobile units or smart cards.

INTRODUCTION
Diffie and Hellman’s protocol is the first key exchange protocol [5]. However, Diffie and Hellman protocol does not provide authentication mechanism, and therefore easily suffers from “man-in-the-middle” attack. To overcome this problem, many key exchange protocols with authentication function have been developed [1,3], among which password based authenticated key exchange protocols are of interest. Since the password based authenticated key exchange protocols require users only to remember a human-memorable password, it is rather simple and user friendly. In 1992, Bellovin and Merritt is the first password based authenticated key exchange (PAKE) protocol which has been widely studied and much research has been proposed [2]. Recently, besides the two-party PAKE protocols, many researchers have begun to study the three-party PAKE protocols [10,12,13,14]. In a three-party password based authenticated key exchange, each client (user) first shares a human-memorable password with a trusted server (TS), and then when two users wish to create a session key, they resort to the trusted server for authenticating each other. With the sharing passwords, TS can help the two clients to authenticate each other and construct a common key for secure communication. However, these previously proposed schemes cannot resist the password guessing attacks [7,8,14]. In order to improve the password guessing attacks, Lin et al. presented a new three-party password based authenticated key exchange by using the server’s public key [11]. However, employing the server’s public key places a burden on the clients, because they have to verify it in advance. Therefore, many three-party key exchange protocols without a server’s public key have been developed to improve this issue [9,10,12,13]. Unfortunately, some of them require more rounds for authentication protocol - the bandwidth consumption rates are quite demanding and likely to bottleneck in many applications [11] - the others are not secure [9,10,12]. Later, to the best of our knowledge, Lu and Cao proposed a three-party password based key exchange protocol which is more efficient than previously proposed schemes [14]. However, in 2008, Chang points out that Lu and Cao’s also suffers from on-line password guessing attacks [5]. Currently, more and more people need secure transactions by cell phone for the electronic commerce. The security and efficiency are both important requirements for mobile communications. It is necessary to construct low-computation and communication for three-party key exchange protocol, two remote users and a trusted server. Moreover, compared to Diffie-Hellman key agreement [5] or the RSA cryptography system [16], elliptic curve cryptography (ECC) can achieve the same level of security with smaller key size. For example, it has been shown that 160-bit ECC provides comparable security to 1024-bit RSA and 224-bit ECC provides comparable security to 2048-bit RSA [7,15]. Hence, under the same security level, smaller key sizes of ECC offer merits of computational efficiency, as well as memory, and bandwidth saving. It is better suited for resource constrained devices such as smart cards or mobile units. Therefore, based on ECC, this article proposes an efficient three-party password based key exchange without the server’s public key. The proposed method not only reduces computation cost for remote users and a trusted server but also is more efficient than Lu and Cao’s scheme [14]. It is very suitable for the mobile environments.



Reply
#3

hi can u provide me any videofile for this project
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: secure multi signature generation for group communication 2012 paper, secure key exchange and encryption mechanism for group communication in ad hoc networks, key less approach to image encryption, balancing revocation and storage trade offs in secure group communication pdf, key less approach for image encryption, secure multisignature generation for group communication ieee paper, key management in adhoc networks,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Vertical Handoff Decision Algorithm Providing Optimized Performance in Heterogeneous Wireless Networks computer science topics 2 30,163 07-10-2016, 09:02 AM
Last Post: ijasti
  Data Encryption Standard (DES) seminar class 2 9,331 20-02-2016, 01:59 PM
Last Post: seminar report asees
  Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curv project report helper 2 3,145 31-10-2015, 02:16 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 27,933 01-05-2015, 03:36 PM
Last Post: seminar report asees
  Mobile Train Radio Communication Electrical Fan 5 14,706 11-03-2015, 07:27 PM
Last Post: Guest
  Heterogeneous Wireless Sensor Networks in a Tele-monitoring System for Homecare electronics seminars 2 2,546 26-02-2015, 08:03 PM
Last Post: Guest
Heart wireless intelligent network(win) (Download Full Report And Abstract) computer science crazy 7 15,240 10-02-2015, 05:52 PM
Last Post: seminar report asees
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 116 82,027 03-04-2014, 11:39 PM
Last Post: seminar report asees
  XML encryption full report computer science technology 6 12,775 21-03-2014, 05:22 PM
Last Post: MichaelPn
Music Blast Wireless (Download Full Report And Abstract) computer science crazy 8 6,595 18-02-2014, 01:13 AM
Last Post: Guest

Forum Jump: