scholarly journals AN AUTHENTICATION FOR GROUP COMMUNICATIONS IN AD-HOC NETWORKS

Author(s):  
Peter Akubo Alabi

Group communication implies a many-to-many communication and it goes beyond both one-to-one communication (i.e., unicast) and one-to-many communication (i.e., multicast). Unlike most user authentication protocols that authenticate a single user each time, we propose a new type of authentication, called group authentication that authenticates all users in a group at once. The group authentication protocol is specially designed to support group communications. There is a group manager who is responsible to manage the group communication. During registration, each user of a group obtains an unique token from the group manager. Users present their tokens to determine whether they all belong to the same group or not. The group authentication protocol allows users to reuse their tokens without compromising the security of tokens. In addition, the group authentication can protect the identity of each user.

2017 ◽  
Vol 2017 ◽  
pp. 1-7 ◽  
Author(s):  
Lein Harn ◽  
Ching-Fang Hsu

A new type of authentication, called group authentication, has been proposed recently which can authenticate all users belonging to the same group at once in a group communication. However, the group authentication can only detect the existence of nonmembers but cannot identify who are the nonmembers. Furthermore, in a group communication, it needs not only to authenticate memberships but also to establish a group key among all members. In this paper, we propose a novel design to provide both membership authentication and group key establishment. Our proposed membership authentication can not only detect nonmembers but also identify who are the nonmembers. We first propose a basic membership authentication and key establishment protocol which can only support one-time group communication. Then, we extend the basic protocol to support multiple group communications. Our design is unique since tokens of users issued by a group manager (GM) during registration are used for both membership authentication and group key establishment.


2007 ◽  
Vol 30 (11-12) ◽  
pp. 2428-2441 ◽  
Author(s):  
Yixin Jiang ◽  
Chuang Lin ◽  
Minghui Shi ◽  
Xuemin (Sherman) Shen ◽  
Xiaowen Chu

Sign in / Sign up

Export Citation Format

Share Document