DocumentCode :
2902278
Title :
Session Key Generation for a Group Call and Device for Security Control
Author :
Jung, Younchan ; Festijo, Enrique
Author_Institution :
Sch. of Inf. & Commun. Eng., Catholic Univ., Puchon, South Korea
fYear :
2011
fDate :
16-18 Nov. 2011
Firstpage :
1756
Lastpage :
1762
Abstract :
Abstract-The presence of wireless links makes mobile ad hoc networks more vulnerable than wire-line networks to various forms of attack. Multimedia group communication applications over such Ad hoc networks need a group key to encrypt group call traffic. This security requirement for group communications can be fulfilled by applying dynamic group key management architecture. In this paper, we propose the key agreement architecture that can be realized by encrypting RTP (Real-time Protocol) packets with call-based dynamic group key. We also propose the key control device (KCD) that legally listen to any group call. We solve these contradictory sounding goals: encrypting call traffic and monitoring call traffic. The key agreement part forces every group member to calculate the key tree by means of an iterative Diffie-Hellman group key exchange. In the proposed key management, the transaction manager (TM) is designed to report call information so KCD may compute the same group key for security control. In contrast to the called members, the calling user (that is, TM) generates a random number that is temporarily used as its one time session key doing duty for its original private key. This one time session key will stop the group key being re-used and prevent exploitation of group key weaknesses. Finally, we analyze the computational load (Cload) and message transmission load (MTload) required for group key computation.
Keywords :
cryptographic protocols; iterative methods; mobile ad hoc networks; multimedia communication; radio links; telecommunication security; telecommunication traffic; trees (mathematics); KCD; RTP packets; TM; call-based dynamic group key; dynamic group key management architecture; group call traffic encryption; iterative Diffie-Hellman group key exchange; key agreement architecture; key control device; message transmission load; mobile ad hoc networks; multimedia group communication; real-time protocol packets; security control; session key generation; transaction manager; wire-line networks; wireless links; Ad hoc networks; Computer architecture; Cryptography; Educational institutions; Mobile computing; Peer to peer computing; Call-based dynamic group key; Computational load; Key agreement; Key control device; Multimedia group communications; Security control;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on
Conference_Location :
Changsha
Print_ISBN :
978-1-4577-2135-9
Type :
conf
DOI :
10.1109/TrustCom.2011.245
Filename :
6121043
Link To Document :
بازگشت