Asymmetric Group Key Agreement Protocol for Secure Group Communication Using FIFO Routing Technique for Wireless Networks

Authors(2) :-M.Thamarai Selvan, Dr. N. Pasupathy

At present scenario a popular approach to secure group communications is to utilize group key agreement (GKA) and asymmetric secret key generated by asymmetric Group key agreement (AGKA) algorithm based on strongly indefensible and identity-based batch multi-signatures (IBBMS) is widely employed for secure group communications in contemporary mutual and group-oriented applications in wireless networks. AGKA is identify-based cryptosystems with an emphasis on round-efficient, the sender has to be unlimited and the member is vibrant. It allows a more then members dynamically in to the network communication and establish a public group encryption key, and each member has a different secret decryption key in an identify-based cryptosystem. Any node of the network is to be encrypting the message using group secret key and decrypt the message using unique private key in the target node This paper examines a set key settlement trouble where a person is simplest privacy to his associates at the same time as the connectivity graph is arbitrary. In our hassle, there is not any centralized initialization for users. A group key settlement with those functions could be very appropriate for social networks. The results show that the proposed Identity-based authenticated asymmetric group key agreement (IBAAGKA) protocol with First in First Out (FIFO) routing technique establish a common encryption key which does not need certificates and is free from key escrow, extra efforts are required to address user dynamicity and provable security. This protocol acquires lower bounds at the round complexity with passive protection and actively relaxed protocol is constructed from a passively at ease one.

Authors and Affiliations

M.Thamarai Selvan
Research Scholar, Department of Electronics, Erode Arts and Science College, Erode, India
Dr. N. Pasupathy
Associate Professor, Department of Electronics, Erode Arts and Science College, Erode, India

Group key agreement, asymmetric group key, lower bound, authentication, protocol.

  1. Pourpouneh, Mohsen, Rasoul Ramezanian, and Afshin Zarei. "A Note on Group Authentication Schemes." International Journal of Computer Network and Information Security 8, no. 5 (2016): 1
  2. X. Lv, H. Li, and B. Wang, "Authenticated asymmetric group key agreement based on certificateless cryptosystem," Int. J. Comput. Math., vol. 91, no. 3, pp. 447-460, 2014.
  3. Zou, Shaofeng, Yingbin Liang, Lifeng Lai, H. Vincent Poor, and Shlomo Shamai. "Broadcast networks with layered decoding and layered secrecy: Theory and applications." Proceedings of the IEEE 103, no. 10 (2015): 1841-1856.
  4. Lv, Xixiang, Yi Mu, and Hui Li. "Key management for Smart Grid based on asymmetric key-wrapping." International Journal of Computer Mathematics92, no. 3 (2015): 498-512.
  5. Garg, Sanjam, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, and Brent Waters. "Candidate indistinguishability obfuscation and functional encryption for all circuits." SIAM Journal on Computing 45, no. 3 (2016): 882-929.
  6. L. Zhang, Q. Wu, B. Qin, H. Deng, J. Liu, and W. Shi, "Provably secure certificateless authenticated asymmetric group key agreement," in Proc. 10th Int. Conf. Inf. Security Pract. Exper. (ISPEC), vol. 8434. 2014, pp. 496-510.
  7. L. Zhang, Q. Wu, J. Domingo-Ferrer, B. Qin, S. S. M. Chow, and W. Shi, "Secure one-to-group communications escrow-free ID-based asymmetric group key agreement," in Proc. 9th Chin. Int. Conf. Inf. Security Cryptol. (INSCRYPT), vol. 8567. 2014, pp. 239-254.
  8. X. Lv, H. Li, and B. Wang, "Authenticated asymmetric group key agreement based on certificateless cryptosystem," Int. J. Comput. Math., vol. 91, no. 3, pp. 447-460, 2014.
  9. M. H. Au, J. K. Liu,W. Susilo, and J. Zhou, "Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1909-1922, Dec. 2013.
  10. S. Garg, C. Gentry, and S. Halevi, "Candidate multilinear maps from ideal lattices and applications," in Proc. 32nd Annu. Int. Conf. Theory Appl. Cryptograph. Techn. (EUROCRYPT), 2013, pp. 1-17.
  11. V.R. Sarma Dhulipala, G. R. Kanagachidambaresan, and R. M. Chandrasekaran. "Lack of Power Avoidance: A Fault Classification Based Fault Tolerant Framework Solution for Lifetime Enhancement and Reliable Communication in Wireless Sensor Networks." Information Technology Journal 11 (2012): 719-724.
  12. V.R. Sarma Dhulipala, R. M. Chandrasekaran, and R. Prabakaran. "Timing Analysis and Repeatability Issues of Mobile Adhoc Networking Application Traffics in Large Scale Scenarios." International Journal on Recent Trends in Engineering (IJRTE), Academy Publishers 1.1 (2009).
  13. Baskar S, Pavithra S, Vanitha T. [2015] Optimized placement and routing algorithm for ISCAS-85 circuit",Electronics and Communication Systems (ICECS),2015 2nd International Conference on 2015/2/26,IEEE, 958-96
  14. Baskar S. [2012] ERROR DETECTION AND CORRECTION ENHANCED DECODING OF DIFFERENCE SET CODES FOR MEMORY APPLICATION, International Journal of Advanced Research in Computer and Communication Engineering, IJARCCE. (10):816-820.
  15. Baskar S. [2014] Error recognition and correction enhanced decoding of hybrid codes for memory application at Devices, Circuits and Systems (ICDCS),2nd IEEE Conference. 1-6.
  16. Baskar S. Reliability Oriented Placement And Routing Analysis In Design Of Low Power Multiplier For Wireless Sensor Networks" at International Journal of Applied Engineering Research. 10(44):31384-31390.
  17. Baskar S, Sarma Dhulipala VR. Comparative Analysis on Fault Tolerant Techniques for Memory Cells in Wireless Sensor Devices, Asian Journal of Research in Social Sciences and Humanities. 6 (cs1):519-528.
  18. VoBa, Son, and Octavian T. Ureche. "Distribution control and tracking mechanism of virtual machine appliances." U.S. Patent 9,703,586, issued July 11, 2017.
  19. Ali, Mazhar, Revathi Dhamotharan, Eraj Khan, Samee U. Khan, Athanasios V. Vasilakos, Keqin Li, and Albert Y. Zomaya. "SeDaSC: secure data sharing in clouds." IEEE Systems Journal 11, no. 2 (2017): 395-404.
  20. Dowlin, Nathan, Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. "Manual for using homomorphic encryption for bioinformatics." Proceedings of the IEEE 105, no. 3 (2017): 552-567.

Publication Details

Published in : Volume 4 | Issue 5 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 68-80
Manuscript Number : IJSRST18458
Publisher : Technoscience Academy

Print ISSN : 2395-6011, Online ISSN : 2395-602X

Cite This Article :

M.Thamarai Selvan, Dr. N. Pasupathy, " Asymmetric Group Key Agreement Protocol for Secure Group Communication Using FIFO Routing Technique for Wireless Networks ", International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X, Volume 4, Issue 5, pp.68-80, March-April-2018.
Journal URL : https://ijsrst.com/IJSRST18458
Citation Detection and Elimination     |      | |
  • X. Lv, H. Li, and B. Wang, "Authenticated asymmetric group key agreement based on certificateless cryptosystem," Int. J. Comput. Math., vol. 91, no. 3, pp. 447-460, 2014.
  • Zou, Shaofeng, Yingbin Liang, Lifeng Lai, H. Vincent Poor, and Shlomo Shamai. "Broadcast networks with layered decoding and layered secrecy: Theory and applications." Proceedings of the IEEE 103, no. 10 (2015): 1841-1856.
  • Lv, Xixiang, Yi Mu, and Hui Li. "Key management for Smart Grid based on asymmetric key-wrapping." International Journal of Computer Mathematics92, no. 3 (2015): 498-512.
  • Garg, Sanjam, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, and Brent Waters. "Candidate indistinguishability obfuscation and functional encryption for all circuits." SIAM Journal on Computing 45, no. 3 (2016): 882-929.
  • L. Zhang, Q. Wu, B. Qin, H. Deng, J. Liu, and W. Shi, "Provably secure certificateless authenticated asymmetric group key agreement," in Proc. 10th Int. Conf. Inf. Security Pract. Exper. (ISPEC), vol. 8434. 2014, pp. 496-510.
  • L. Zhang, Q. Wu, J. Domingo-Ferrer, B. Qin, S. S. M. Chow, and W. Shi, "Secure one-to-group communications escrow-free ID-based asymmetric group key agreement," in Proc. 9th Chin. Int. Conf. Inf. Security Cryptol. (INSCRYPT), vol. 8567. 2014, pp. 239-254.
  • X. Lv, H. Li, and B. Wang, "Authenticated asymmetric group key agreement based on certificateless cryptosystem," Int. J. Comput. Math., vol. 91, no. 3, pp. 447-460, 2014.
  • M. H. Au, J. K. Liu,W. Susilo, and J. Zhou, "Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1909-1922, Dec. 2013.
  • S. Garg, C. Gentry, and S. Halevi, "Candidate multilinear maps from ideal lattices and applications," in Proc. 32nd Annu. Int. Conf. Theory Appl. Cryptograph. Techn. (EUROCRYPT), 2013, pp. 1-17.
  • V.R. Sarma Dhulipala, G. R. Kanagachidambaresan, and R. M. Chandrasekaran. "Lack of Power Avoidance: A Fault Classification Based Fault Tolerant Framework Solution for Lifetime Enhancement and Reliable Communication in Wireless Sensor Networks." Information Technology Journal 11 (2012): 719-724.
  • V.R. Sarma Dhulipala, R. M. Chandrasekaran, and R. Prabakaran. "Timing Analysis and Repeatability Issues of Mobile Adhoc Networking Application Traffics in Large Scale Scenarios." International Journal on Recent Trends in Engineering (IJRTE), Academy Publishers 1.1 (2009).
  • Baskar S, Pavithra S, Vanitha T. [2015] Optimized placement and routing algorithm for ISCAS-85 circuit",Electronics and Communication Systems (ICECS),2015 2nd International Conference on 2015/2/26,IEEE, 958-96
  • Baskar S. [2012] ERROR DETECTION AND CORRECTION ENHANCED DECODING OF DIFFERENCE SET CODES FOR MEMORY APPLICATION, International Journal of Advanced Research in Computer and Communication Engineering, IJARCCE. (10):816-820.
  • Baskar S. [2014] Error recognition and correction enhanced decoding of hybrid codes for memory application at Devices, Circuits and Systems (ICDCS),2nd IEEE Conference. 1-6.
  • Baskar S. Reliability Oriented Placement And Routing Analysis In Design Of Low Power Multiplier For Wireless Sensor Networks" at International Journal of Applied Engineering Research. 10(44):31384-31390.
  • Baskar S, Sarma Dhulipala VR. Comparative Analysis on Fault Tolerant Techniques for Memory Cells in Wireless Sensor Devices, Asian Journal of Research in Social Sciences and Humanities. 6 (cs1):519-528.
  • VoBa, Son, and Octavian T. Ureche. "Distribution control and tracking mechanism of virtual machine appliances." U.S. Patent 9,703,586, issued July 11, 2017.
  • Ali, Mazhar, Revathi Dhamotharan, Eraj Khan, Samee U. Khan, Athanasios V. Vasilakos, Keqin Li, and Albert Y. Zomaya. "SeDaSC: secure data sharing in clouds." IEEE Systems Journal 11, no. 2 (2017): 395-404.
  • Dowlin, Nathan, Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. "Manual for using homomorphic encryption for bioinformatics." Proceedings of the IEEE 105, no. 3 (2017): 552-567.
  • " target="_blank"> BibTeX
    |
  • X. Lv, H. Li, and B. Wang, "Authenticated asymmetric group key agreement based on certificateless cryptosystem," Int. J. Comput. Math., vol. 91, no. 3, pp. 447-460, 2014.
  • Zou, Shaofeng, Yingbin Liang, Lifeng Lai, H. Vincent Poor, and Shlomo Shamai. "Broadcast networks with layered decoding and layered secrecy: Theory and applications." Proceedings of the IEEE 103, no. 10 (2015): 1841-1856.
  • Lv, Xixiang, Yi Mu, and Hui Li. "Key management for Smart Grid based on asymmetric key-wrapping." International Journal of Computer Mathematics92, no. 3 (2015): 498-512.
  • Garg, Sanjam, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, and Brent Waters. "Candidate indistinguishability obfuscation and functional encryption for all circuits." SIAM Journal on Computing 45, no. 3 (2016): 882-929.
  • L. Zhang, Q. Wu, B. Qin, H. Deng, J. Liu, and W. Shi, "Provably secure certificateless authenticated asymmetric group key agreement," in Proc. 10th Int. Conf. Inf. Security Pract. Exper. (ISPEC), vol. 8434. 2014, pp. 496-510.
  • L. Zhang, Q. Wu, J. Domingo-Ferrer, B. Qin, S. S. M. Chow, and W. Shi, "Secure one-to-group communications escrow-free ID-based asymmetric group key agreement," in Proc. 9th Chin. Int. Conf. Inf. Security Cryptol. (INSCRYPT), vol. 8567. 2014, pp. 239-254.
  • X. Lv, H. Li, and B. Wang, "Authenticated asymmetric group key agreement based on certificateless cryptosystem," Int. J. Comput. Math., vol. 91, no. 3, pp. 447-460, 2014.
  • M. H. Au, J. K. Liu,W. Susilo, and J. Zhou, "Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1909-1922, Dec. 2013.
  • S. Garg, C. Gentry, and S. Halevi, "Candidate multilinear maps from ideal lattices and applications," in Proc. 32nd Annu. Int. Conf. Theory Appl. Cryptograph. Techn. (EUROCRYPT), 2013, pp. 1-17.
  • V.R. Sarma Dhulipala, G. R. Kanagachidambaresan, and R. M. Chandrasekaran. "Lack of Power Avoidance: A Fault Classification Based Fault Tolerant Framework Solution for Lifetime Enhancement and Reliable Communication in Wireless Sensor Networks." Information Technology Journal 11 (2012): 719-724.
  • V.R. Sarma Dhulipala, R. M. Chandrasekaran, and R. Prabakaran. "Timing Analysis and Repeatability Issues of Mobile Adhoc Networking Application Traffics in Large Scale Scenarios." International Journal on Recent Trends in Engineering (IJRTE), Academy Publishers 1.1 (2009).
  • Baskar S, Pavithra S, Vanitha T. [2015] Optimized placement and routing algorithm for ISCAS-85 circuit",Electronics and Communication Systems (ICECS),2015 2nd International Conference on 2015/2/26,IEEE, 958-96
  • Baskar S. [2012] ERROR DETECTION AND CORRECTION ENHANCED DECODING OF DIFFERENCE SET CODES FOR MEMORY APPLICATION, International Journal of Advanced Research in Computer and Communication Engineering, IJARCCE. (10):816-820.
  • Baskar S. [2014] Error recognition and correction enhanced decoding of hybrid codes for memory application at Devices, Circuits and Systems (ICDCS),2nd IEEE Conference. 1-6.
  • Baskar S. Reliability Oriented Placement And Routing Analysis In Design Of Low Power Multiplier For Wireless Sensor Networks" at International Journal of Applied Engineering Research. 10(44):31384-31390.
  • Baskar S, Sarma Dhulipala VR. Comparative Analysis on Fault Tolerant Techniques for Memory Cells in Wireless Sensor Devices, Asian Journal of Research in Social Sciences and Humanities. 6 (cs1):519-528.
  • VoBa, Son, and Octavian T. Ureche. "Distribution control and tracking mechanism of virtual machine appliances." U.S. Patent 9,703,586, issued July 11, 2017.
  • Ali, Mazhar, Revathi Dhamotharan, Eraj Khan, Samee U. Khan, Athanasios V. Vasilakos, Keqin Li, and Albert Y. Zomaya. "SeDaSC: secure data sharing in clouds." IEEE Systems Journal 11, no. 2 (2017): 395-404.
  • Dowlin, Nathan, Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. "Manual for using homomorphic encryption for bioinformatics." Proceedings of the IEEE 105, no. 3 (2017): 552-567.
  • " target="_blank">RIS
    |
  • X. Lv, H. Li, and B. Wang, "Authenticated asymmetric group key agreement based on certificateless cryptosystem," Int. J. Comput. Math., vol. 91, no. 3, pp. 447-460, 2014.
  • Zou, Shaofeng, Yingbin Liang, Lifeng Lai, H. Vincent Poor, and Shlomo Shamai. "Broadcast networks with layered decoding and layered secrecy: Theory and applications." Proceedings of the IEEE 103, no. 10 (2015): 1841-1856.
  • Lv, Xixiang, Yi Mu, and Hui Li. "Key management for Smart Grid based on asymmetric key-wrapping." International Journal of Computer Mathematics92, no. 3 (2015): 498-512.
  • Garg, Sanjam, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, and Brent Waters. "Candidate indistinguishability obfuscation and functional encryption for all circuits." SIAM Journal on Computing 45, no. 3 (2016): 882-929.
  • L. Zhang, Q. Wu, B. Qin, H. Deng, J. Liu, and W. Shi, "Provably secure certificateless authenticated asymmetric group key agreement," in Proc. 10th Int. Conf. Inf. Security Pract. Exper. (ISPEC), vol. 8434. 2014, pp. 496-510.
  • L. Zhang, Q. Wu, J. Domingo-Ferrer, B. Qin, S. S. M. Chow, and W. Shi, "Secure one-to-group communications escrow-free ID-based asymmetric group key agreement," in Proc. 9th Chin. Int. Conf. Inf. Security Cryptol. (INSCRYPT), vol. 8567. 2014, pp. 239-254.
  • X. Lv, H. Li, and B. Wang, "Authenticated asymmetric group key agreement based on certificateless cryptosystem," Int. J. Comput. Math., vol. 91, no. 3, pp. 447-460, 2014.
  • M. H. Au, J. K. Liu,W. Susilo, and J. Zhou, "Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1909-1922, Dec. 2013.
  • S. Garg, C. Gentry, and S. Halevi, "Candidate multilinear maps from ideal lattices and applications," in Proc. 32nd Annu. Int. Conf. Theory Appl. Cryptograph. Techn. (EUROCRYPT), 2013, pp. 1-17.
  • V.R. Sarma Dhulipala, G. R. Kanagachidambaresan, and R. M. Chandrasekaran. "Lack of Power Avoidance: A Fault Classification Based Fault Tolerant Framework Solution for Lifetime Enhancement and Reliable Communication in Wireless Sensor Networks." Information Technology Journal 11 (2012): 719-724.
  • V.R. Sarma Dhulipala, R. M. Chandrasekaran, and R. Prabakaran. "Timing Analysis and Repeatability Issues of Mobile Adhoc Networking Application Traffics in Large Scale Scenarios." International Journal on Recent Trends in Engineering (IJRTE), Academy Publishers 1.1 (2009).
  • Baskar S, Pavithra S, Vanitha T. [2015] Optimized placement and routing algorithm for ISCAS-85 circuit",Electronics and Communication Systems (ICECS),2015 2nd International Conference on 2015/2/26,IEEE, 958-96
  • Baskar S. [2012] ERROR DETECTION AND CORRECTION ENHANCED DECODING OF DIFFERENCE SET CODES FOR MEMORY APPLICATION, International Journal of Advanced Research in Computer and Communication Engineering, IJARCCE. (10):816-820.
  • Baskar S. [2014] Error recognition and correction enhanced decoding of hybrid codes for memory application at Devices, Circuits and Systems (ICDCS),2nd IEEE Conference. 1-6.
  • Baskar S. Reliability Oriented Placement And Routing Analysis In Design Of Low Power Multiplier For Wireless Sensor Networks" at International Journal of Applied Engineering Research. 10(44):31384-31390.
  • Baskar S, Sarma Dhulipala VR. Comparative Analysis on Fault Tolerant Techniques for Memory Cells in Wireless Sensor Devices, Asian Journal of Research in Social Sciences and Humanities. 6 (cs1):519-528.
  • VoBa, Son, and Octavian T. Ureche. "Distribution control and tracking mechanism of virtual machine appliances." U.S. Patent 9,703,586, issued July 11, 2017.
  • Ali, Mazhar, Revathi Dhamotharan, Eraj Khan, Samee U. Khan, Athanasios V. Vasilakos, Keqin Li, and Albert Y. Zomaya. "SeDaSC: secure data sharing in clouds." IEEE Systems Journal 11, no. 2 (2017): 395-404.
  • Dowlin, Nathan, Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. "Manual for using homomorphic encryption for bioinformatics." Proceedings of the IEEE 105, no. 3 (2017): 552-567.
  • " target="_blank">CSV

    Article Preview