GAnGS: Gather, Authenticate 'n Group Securely

被引:18
作者
Chen, Chia-Hsin Owen [2 ]
Chen, Chung-Wei [3 ]
Kuo, Cynthia [1 ]
Lai, Yan-Hao [4 ]
McCune, Jonathan M. [1 ]
Studer, Ahren [1 ]
Perrig, Adrian [1 ]
Yang, Bo-Yin [2 ]
Wu, Tzong-Chen [5 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] Acad Sinica, Taipei, Taiwan
[3] Natl Tsing Hua Univ, Hsinchu, Taiwan
[4] Natl Chung Hsing Univ, Taichung, Taiwan
[5] Natl Taiwan Univ Sci & Technol, Taipei, Taiwan
来源
MOBICOM'08: PROCEEDINGS OF THE FOURTEENTH ACM INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING | 2008年
关键词
D O I
10.1145/1409944.1409957
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Establishing secure communication among a group of physically collocated people is a challenge. This problem can be reduced to establishing authentic public keys among all the participants - these public keys then serve to establish a shared secret symmetric key for encryption and authentication of messages. Unfortunately, in most real-world settings, public key infrastructures (PKI) are uncommon and distributing a secret in a public space is difficult. Thus, it is a challenge to exchange authentic public keys in a scalable, secure, and easy to use fashion. In this paper, we propose GAnGS, a protocol for the secure exchange of authenticated information among a group of people. In contrast to prior work, GAnGS resists Group-in-the-Middle and Sybil attacks by malicious insiders, as well as infiltration attacks by malicious bystanders. GAnGS is designed to be robust to user errors, such as miscounting the number of participants or incorrectly comparing checksums. We have implemented and evaluated GAnGS on Nokia N70 phones. The GAnGS system is viable and achieves a good balance between scalability, security, and ease of use.
引用
收藏
页码:92 / +
页数:2
相关论文
共 30 条
[1]  
Abdalla M, 2006, LECT NOTES COMPUT SC, V3958, P427
[2]  
[Anonymous], 2002, 1 INT WORKSH PEER TO
[3]  
[Anonymous], LNCS
[4]   Key agreement in ad hoc networks [J].
Asokan, N ;
Ginzboorg, P .
COMPUTER COMMUNICATIONS, 2000, 23 (17) :1627-1637
[5]  
Balfanz Dirk, 2002, P NETW DISTR SYST SE
[6]  
BRENNEN VA, 2008, KEYSIGNING PARTY HOW
[7]  
Burmester Mike., 1996, SECURITY PROTOCOLS I, P119
[8]   Key agreement in peer-to-peer wireless networks [J].
Cagalj, M ;
Capkun, S ;
Hubaux, JP .
PROCEEDINGS OF THE IEEE, 2006, 94 (02) :467-478
[9]  
CASTELLUCCIA C, 2005, P ACM US MOB
[10]   Public-key support for group collaboration [J].
Ellison, Carl ;
Dohrmann, Steve .
ACM Transactions on Information and System Security, 2003, 6 (04) :547-565