A novel tree-based authenticated dynamic group key agreement protocol for wireless sensor network

Tang Hong*, Zhu Liehuang, Cao Yuanda, Wang Dazhen

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Citations (Scopus)

Abstract

Group key agreement protocol allows all the members to agree upon a common session key, which may be used for later secure communication among all the participants. Since TGDH (tree based Diffie-Hellman) has been proposed by Yongdae Kim, Adrian Perrig, and Gene Tsudik, there are several group key agreement protocols proposed to improve the security and performance of TGDH. In this paper, we first propose authenticated two-party and three-party key agreement protocols based on bilinear pairing. Then, using authenticated two party or three party key agreement protocols to compute the key of a node which has two or three child nodes, we propose a novel tree-based authenticated group key agreement protocol. Our protocol provides implicit key authentication, which TGDH cannot provide. Through substituting ternary tree for binary and substituting bilinear pairing and ellipse curve DH for DH, our protocol is more efficient both in term of computation and communication than TGDH.

Original languageEnglish
Title of host publicationProceedings of the International Symposium on Electronic Commerce and Security, ISECS 2008
Pages540-544
Number of pages5
DOIs
Publication statusPublished - 2008
EventInternational Symposium on Electronic Commerce and Security, ISECS 2008 - Guangzhou, China
Duration: 3 Aug 20085 Aug 2008

Publication series

NameProceedings of the International Symposium on Electronic Commerce and Security, ISECS 2008

Conference

ConferenceInternational Symposium on Electronic Commerce and Security, ISECS 2008
Country/TerritoryChina
CityGuangzhou
Period3/08/085/08/08

Fingerprint

Dive into the research topics of 'A novel tree-based authenticated dynamic group key agreement protocol for wireless sensor network'. Together they form a unique fingerprint.

Cite this