Exploration of Schemes for Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptosystem

Wireless technology has become more persistent with wide demand of mobile devices such as personal digital assistance, smart phones and laptops. The elliptic curve cryptography(ECC) techniques provide greater security using fewer bits resulting in a protocol which requires low computational and communication overhead, therefore suitable for wireless communication system as well as wireless communication devices smart cards, PDAs and other handheld devices. These systems are prone to eavesdropping due to easy access to free space medium. In such cases, appropriate authenticity and cryptographic procedures need to be adopted for reliable and secure communication. Key agreement protocol based on elliptic curve cryptography suited for wireless network. This paper describes various schemes used for implementation of authenticated key agreement protocol in wireless network.

[1]  He Chen,et al.  A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications , 2005 .

[2]  Tianhua Liu,et al.  A Robust and Efficient Password-authenticated Key Agreement Scheme without Verification Table Based on Elliptic Curve Cryptosystem , 2010, 2010 International Conference on Computational Aspects of Social Networks.

[3]  Bingwu Liu,et al.  Research on Efficiency of Computing kP in Elliptic Curve System , 2010, 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM).

[4]  P. Shah Investigating effects of co-ordinate system on execution time of elliptical curve protocol in wireless sensor networks , 2012, 2012 International Conference on Future Communication Networks.

[5]  Xun Yi,et al.  Authenticated key agreement in dynamic peer groups , 2004, Theor. Comput. Sci..

[6]  Moncef Amara,et al.  Elliptic Curve Cryptography and its applications , 2011, International Workshop on Systems, Signal Processing and their Applications, WOSSPA.

[7]  Jianhua Chen,et al.  Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices , 2010, IACR Cryptol. ePrint Arch..

[8]  Eun-Jun Yoon,et al.  A SECURE AND EFFICIENCY ID-BASED AUTHENTICATED KEY AGREEMENT SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM FOR MOBILE DEVICES , 2012 .

[9]  Miguel Morales-Sandoval,et al.  Elliptic curve cryptography on Windows CE devices , 2012, CONIELECOMP 2012, 22nd International Conference on Electrical Communications and Computers.

[10]  Siham Ezzouak,et al.  Improving Pollard's Rho attack on elliptic curve cryptosystems , 2012, 2012 International Conference on Multimedia Computing and Systems.

[11]  Minh-Triet Tran,et al.  Improvement of the More Efficient and Secure ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[12]  G. P. Biswas,et al.  A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks , 2012, Ann. des Télécommunications.

[13]  Bernd Freisleben,et al.  Managing Behaviour Trust in Grids Using Statistical Methods of Quality Assurance , 2007 .

[14]  Alfred Menezes,et al.  Key Agreement Protocols and Their Security Analysis , 1997, IMACC.

[15]  Liu Zhi-meng An elliptic curve cryptography based on authentication and key agreement protocol for wireless communication , 2008 .

[16]  Suhas N. Diggavi,et al.  Group secret key agreement over state-dependent wireless broadcast channels , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[17]  Xia Lin The application of Elliptic Curve Cryptography in Electronic Commerce , 2012, 2012 IEEE Symposium on Electrical & Electronics Engineering (EEESYM).

[18]  Wei Yuan,et al.  Improvement of an Efficient Identity-Based Group Key Agreement Protocol , 2011, 2011 International Conference on Network Computing and Information Security.

[19]  V. Vijayalakshmi,et al.  Effective Key Establishment and Authentication Protocol for Wireless Sensor Networks Using Elliptic Curve ... 1 Effective Key Establishment and Authentication Protocol for Wireless Sensor Networks Using Elliptic Curve Cryptography , 2008 .

[20]  B. Maheshwari SECURE KEY AGREEMENT AND AUTHENTICATION PROTOCOLS , 2012 .

[21]  Rakesh Chandra Gangwar SECURE AND EFFICIENT DECENTRALIZED GROUP KEY ESTABLISHMENT PROTOCOL FOR ROBUST GROUP COMMUNICATION , 2008 .

[22]  Bachar El-Hassan,et al.  A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography , 2007, Third International Symposium on Information Assurance and Security.