Authors: Mark Manulis, Ahmad-Reza Sadeghi
Addresses: Cryptographic Protocols Group, TU Darmstadt & CASED, Mornewegstr. 30, Darmstadt 64293, Germany. ' System Security Group, Horst-Gortz Institute for IT-Security, Ruhr-University Bochum, Universitatsstrasse 150, Bochum 44780, Germany
Abstract: Security of various group-oriented applications for mobile ad-hoc groups requires a group secret shared between all participants. Contributory Group Key Agreement (CGKA) protocols can be used in mobile ad-hoc scenarios due to the absence of any trusted central authority (group manager) that actively participates in the computation of the group key. Members of spontaneously formed mobile ad-hoc groups are usually equipped with different kinds of mobile devices with varying performance capabilities. This heterogeneity opens new ways for the design of CGKA protocols and states additional security requirements with regard to the trustworthiness of the devices. In this paper we propose a CGKA protocol for mobile ad hoc groups that fairly distributes the computation costs amongst mobile devices by taking into account their performance limitations and preventing possible cheating through Trusted Computing techniques.
Keywords: group key agreement; mobile ad-hoc groups; heterogeneous device performance; security; trustworthiness; trusted computing; mobile devices.
International Journal of Wireless and Mobile Computing, 2010 Vol.4 No.1, pp.17 - 30
Published online: 14 Jan 2010 *Full-text access for editors Access for subscribers Purchase this article Comment on this article