TY - JOUR
T1 - Provably Secure Receiver-Unrestricted Group Key Management Scheme for Mobile Ad Hoc Networks †
AU - Zhang, Rui
AU - Han, Wendie
AU - Zhang, Lei
AU - Wang, Lulu
AU - Meng, Xinyu
N1 - Publisher Copyright:
© 2023 by the authors.
PY - 2023/5
Y1 - 2023/5
N2 - Mobile ad hoc networks (MANETs) are self-configuring networks of wireless nodes, i.e., mobile devices. Since communications in MANETs occur via wireless channels, it is of significance to secure communications among wireless and mobile nodes. Group key management, as a widely used method for securing group communications, has potentially been used in MANETs for years. Most recently, a secure receiver-unrestricted group key management scheme for MANETs has been proposed, which is used to establish a secure channel among a group of wireless nodes without a trusted dealer, which has some advantages such as eliminating the certificate management problem and receiver restriction. However, a formal security analysis of this scheme is still lacking. Therefore, in this paper, we propose the complete security proof to demonstrate that the scheme satisfies the essential security properties including authentication, message confidentiality, known-key security and dynamic secrecy. We also give a brief discussion about the efficiency of the scheme.
AB - Mobile ad hoc networks (MANETs) are self-configuring networks of wireless nodes, i.e., mobile devices. Since communications in MANETs occur via wireless channels, it is of significance to secure communications among wireless and mobile nodes. Group key management, as a widely used method for securing group communications, has potentially been used in MANETs for years. Most recently, a secure receiver-unrestricted group key management scheme for MANETs has been proposed, which is used to establish a secure channel among a group of wireless nodes without a trusted dealer, which has some advantages such as eliminating the certificate management problem and receiver restriction. However, a formal security analysis of this scheme is still lacking. Therefore, in this paper, we propose the complete security proof to demonstrate that the scheme satisfies the essential security properties including authentication, message confidentiality, known-key security and dynamic secrecy. We also give a brief discussion about the efficiency of the scheme.
KW - group key management
KW - mobile ad hoc networks
KW - receiver restricted
KW - security proof
UR - https://www.scopus.com/pages/publications/85159155258
U2 - 10.3390/s23094198
DO - 10.3390/s23094198
M3 - 文章
C2 - 37177401
AN - SCOPUS:85159155258
SN - 1424-8220
VL - 23
JO - Sensors
JF - Sensors
IS - 9
M1 - 4198
ER -