About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
3rd International ICST Conference on COMmunication System SoftWAre and MiddlewaRE

Research Article

A Secure Verifiable Key Agreement Protocol for Mobile Conferencing

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/COMSWA.2008.4554412,
        author={Mounita Saha and Dipanwita RoyChowdhury and Indranil Sengupta},
        title={A Secure Verifiable Key Agreement Protocol for Mobile Conferencing},
        proceedings={3rd International ICST Conference on COMmunication System SoftWAre and MiddlewaRE},
        publisher={IEEE},
        proceedings_a={COMSWARE},
        year={2008},
        month={6},
        keywords={key agreement protocols authentication mobile teleconference},
        doi={10.1109/COMSWA.2008.4554412}
    }
    
  • Mounita Saha
    Dipanwita RoyChowdhury
    Indranil Sengupta
    Year: 2008
    A Secure Verifiable Key Agreement Protocol for Mobile Conferencing
    COMSWARE
    IEEE
    DOI: 10.1109/COMSWA.2008.4554412
Mounita Saha1,*, Dipanwita RoyChowdhury1, Indranil Sengupta1,*
  • 1: Dept. of CSE., IIT, Kharagpur, India
*Contact email: mounita@gmail.com, indranil60@yahoo.co.in

Abstract

A growing application area in wireless communications is mobile teleconference. However, wireless communication are more susceptible to eavesdropping and unauthorized access than the wired communication. It is therefore crucial to build secure conference scheme for such communication. In this work, we propose a true conference key agreement scheme which addresses some security issues not considered in previous works on conference key schemes. In the proposed protocol, the users can verify the utilization of their share in key construction. Also, the scheme is forward secure, provides mutual authentication and secure dynamic joining and leaving. The protocol is shown to be resistant against replay and impersonation attacks.

Keywords
key agreement protocols authentication mobile teleconference
Published
2008-06-27
Publisher
IEEE
Modified
2010-05-16
http://dx.doi.org/10.1109/COMSWA.2008.4554412
Copyright © 2008–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL