Group key exchange protocol based on Diffie-Hellman technique in ad-hoc network
| dc.contributor.author | Zanjani, Maryam Farajzadeh | |
| dc.contributor.author | Alavi Abhari, Seyed Masoud | |
| dc.contributor.author | Chefranov, Alexander G. | |
| dc.date.accessioned | 2026-02-06T17:58:40Z | |
| dc.date.issued | 2014 | |
| dc.department | Doğu Akdeniz Üniversitesi | |
| dc.description | 7th International Conference on Security of Information and Networks, SIN 2014 -- 2014-09-09 through 2014-09-11 -- Glasgow -- | |
| dc.description.abstract | One of the most important issue for secure communication in wireless networks is generating a common key for many participants. Analysis of Tseng's protocol (Y.-M. TSENG, T.-Y. WU, INFORMATICA 2010, 21, 2, 247-259) is done. We show that Tseng's protocol fails to establish a common key when the key generated by Diffie-Hellman protocol is not invertible. It is modified so that its correct work is guaranteed, security features are preserved, and its computational complexity in the most time consuming controller part is decreased at least three times. The Tseng's modified protocol is implemented and tested for ad-hoc WLAN with 3, 4, and 5 nodes. © 2014 ACM. | |
| dc.description.sponsorship | ACM Special Interest Group on Security, Audit, and Control (SIGSAC); Aksaray University; Malaviya National Institute of Technology (MNIT); The Scottish Informatics and Computer Science Alliance (SICSA); University of Glasgow | |
| dc.identifier.doi | 10.1145/2659651.2659725 | |
| dc.identifier.endpage | 169 | |
| dc.identifier.isbn | 9781450377881 | |
| dc.identifier.isbn | 9781450385855 | |
| dc.identifier.isbn | 9781450314398 | |
| dc.identifier.isbn | 9781450396387 | |
| dc.identifier.isbn | 9781450390019 | |
| dc.identifier.isbn | 9781450390217 | |
| dc.identifier.isbn | 9781450348270 | |
| dc.identifier.isbn | 9781450381963 | |
| dc.identifier.isbn | 9781450322485 | |
| dc.identifier.isbn | 9781450348201 | |
| dc.identifier.issn | 2153-1633 | |
| dc.identifier.scopus | 2-s2.0-84938695993 | |
| dc.identifier.scopusquality | Q3 | |
| dc.identifier.startpage | 166 | |
| dc.identifier.uri | https://doi.org/10.1145/2659651.2659725 | |
| dc.identifier.uri | https://search.trdizin.gov.tr/tr/yayin/detay/ | |
| dc.identifier.uri | https://hdl.handle.net/11129/7690 | |
| dc.identifier.volume | 2014-September | |
| dc.indekslendigikaynak | Scopus | |
| dc.language.iso | en | |
| dc.publisher | Association for Computing Machinery acmhelp@acm.org | |
| dc.relation.ispartof | ACM International Conference Proceeding Series | |
| dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | |
| dc.rights | info:eu-repo/semantics/closedAccess | |
| dc.snmz | KA_Scopus_20260204 | |
| dc.subject | Ad-hoc | |
| dc.subject | Diffie-Hellman key exchange (DH key exchange) | |
| dc.subject | Group key exchange (GKE) | |
| dc.subject | Network security | |
| dc.subject | Tseng's protocol | |
| dc.subject | Wireless local area network (WLAN) | |
| dc.title | Group key exchange protocol based on Diffie-Hellman technique in ad-hoc network | |
| dc.type | Conference Object |










