3rd International ICST Conference on COMmunication System SoftWAre and MiddlewaRE

Research Article

A Secure Verifiable Key Agreement Protocol for Mobile Conferencing

  • @INPROCEEDINGS{10.1109/COMSWA.2008.4554412,
        author={Mounita Saha and Dipanwita RoyChowdhury and Indranil Sengupta},
        title={A Secure Verifiable Key Agreement Protocol for Mobile Conferencing},
        proceedings={3rd International ICST Conference on COMmunication System SoftWAre and MiddlewaRE},
        publisher={IEEE},
        proceedings_a={COMSWARE},
        year={2008},
        month={6},
        keywords={key agreement protocols authentication mobile teleconference},
        doi={10.1109/COMSWA.2008.4554412}
    }
    
  • Mounita Saha
    Dipanwita RoyChowdhury
    Indranil Sengupta
    Year: 2008
    A Secure Verifiable Key Agreement Protocol for Mobile Conferencing
    COMSWARE
    IEEE
    DOI: 10.1109/COMSWA.2008.4554412
Mounita Saha1,*, Dipanwita RoyChowdhury1, Indranil Sengupta1,*
  • 1: Dept. of CSE., IIT, Kharagpur, India
*Contact email: mounita@gmail.com, indranil60@yahoo.co.in

Abstract

A growing application area in wireless communications is mobile teleconference. However, wireless communication are more susceptible to eavesdropping and unauthorized access than the wired communication. It is therefore crucial to build secure conference scheme for such communication. In this work, we propose a true conference key agreement scheme which addresses some security issues not considered in previous works on conference key schemes. In the proposed protocol, the users can verify the utilization of their share in key construction. Also, the scheme is forward secure, provides mutual authentication and secure dynamic joining and leaving. The protocol is shown to be resistant against replay and impersonation attacks.