Vigan, L. (2006). Automated analysis of security protocols with the AVISPA tool. Electronic notes in theoretical computer science, 155, 61-86. Nam, J., Lee, J., Kim, S., & Won, D(2005). Group key agreement based on DDH in a mobile environment. Journal of Systems and Software, 78 (1), 73-83. Lee, E. J., Lee, S.E., Yoo, K. Y. (2008). An authenticated group key protocol without a certificate, which offers the secret secret date.
2008 International Symposium on Ubiquitous Multimedia Computing (p. 124-129). ieee. Wireless group communication has recently gained popularity due to the increase in portable and lightweight devices. These devices are capable of performing group communications by allowing each participant to agree on a group key for secure communication over a secure network. Many authenticated group convention schemes have been proposed, but most of the diagrams lack the dynamic ownership of the company`s connection/exit, so the session key is updated without affecting the protocol. In this article, we propose a non-certificate protocol without coupling for the cryptographic-based group key agreement for elliptical curves for resource-limited moving nodes. The purpose of the proposed protocol of the key agreement is to ensure the inugability of any message exchanged between the sender and the recipient, to ensure the quality of the contribution to the group key agreement and to allow mobile users to join or leave the group dynamically by activating the secrets of the front and back. Through rigorous security analysis, we show that the proposed scheme achieves known security functions against different types of attacks through informal security analysis and rigorous formal analysis using the random oracle model. In addition, the protocol validation result, using a generally accepted automated validation of internet security protocols and applications, shows that the protocol is secure in the OFMC and CL-AtSe backends.
In addition, the result of the performance analysis shows that our proposed system provides desirable safety qualities compared to existing related systems, reducing the total cost of calculation and communication, despite a gradual increase in the number of participating mobile nodes. Zhang, L., Zhang, F., Wu, Q., Domingo-Ferrer, J. (2010). A two-party key memorandum of understanding, authenticated and authenticated, simulated and without a certificate. Information Science, 180 (6), 1020-1030. Mandal, S., Mohanty, S. – Majhi, B. CL-AGKA: group contract protocol authenticated without certificate for mobile networks. Wireless Netw 26, 3011-3031 (2020).
doi.org/10.1007/s11276-020-02252-z Lee, C.C., Lin, T. H., Tsai, C.S. (2009). A new group key contract authenticated in a mobile environment. Annals of Telecommunications, 64 (11-12), 735. Islam, S. H., Biswas, G. P. (2012). An identity protocol without coupling for the agreement of group keys for unbalanced mobile phone networks. Annals of Communications, 67 (11-12), 547-558. Tseng, Y.M.
A protocol for group key agreement for unbalanced wireless networks. Computer and Security, 26 (4), 331-337. Geng, M., Zhang, F., Gao, M. (2009). A protocol without a secure certificate for the group key agreement. 2009 International Conference on Multimedia Information Connectivity and Security (vol. 1, 342-346). ieee. Chaudhry, S.A., Naqvi, H., Sher, M., Farash, M.
S., Hassan, M. U. (2017). An enhanced and secure privacy authentication protocol for SIP.