Key management module for smart phone
▶ Introduction
 

Recently, security communication between server and mobile devices is one of the most important issues. 3PAKE protocol is a key exchange protocol with another user based on password which is stored in reliable server. In [18], they propose a group key exchange protocol based on lightweight S-3PAKE protocol. However they didn't consider group leave phase and key renewal phase which is necessary in device add phase. In key management module for smart phone, we should improve group key exchange protocol which is proposed by [18] then we need to define a key registration, key exchange, key renewal, group join phase, group leave phase. Following figures are simple example of device registration and key distribution for smart device. To make following scenario, we use pseudo inverse matrix in key exchange phase.





▶ Research Issues

 
  • 3PAKE (3-Party Authentication Key Agreement)
  • Key distribution based on pseudo inverse matrix
  • Secure group key distribution


  • ▶ References

     
    1. 권정옥, 정익래, 최재탁, 이동훈, “그룹 사용자간 안전한 콘텐츠 전송을 위한 검증자를 이용한 패스워드기반 다자간 키 교환 프로토콜”, 방송공학회논문지, 제 13권 2호, pp251-260, 2008년 3월.
    2. 전일수, “스마트카드를 이용한 3자 참여 인증된 키교환 프로토콜”, 한국 정보보호학회, 제16권, 6호, pp73-80, 2006. 12.
    3. 김용훈, 윤택영, 박영호, “서버의 개입이 없는 스마트카드 기반의 3자간 키 교환 프로토콜”, 한국정보보호학회, 제 18권, 2호, 2008. 4.
    4. 최종석, 신승수, 한군희, “사용자 익명성을 제공하는 스마트카드 기반 3자 참여 키 교환 프로토콜”, 한국산학기술학회논문지, 제10권, 2호, pp388-395, 2009.
    5. 김유창, 디바이스 간 통신(M2M)의 기술 동향과 전망, 차세대 무선통신 기술 매거진, 2009년 7월호 66쪽(http://www.epnc.co.kr/).
    6. M. Steiner, G. Tsudik, and M. Waidner. “Refinement And Extension Of Encrypted Key Exchange”. ACM Operating Systems Review, July 1995.
    7. C.-L. Lin, H.-M. Sun, and T. Hwang. “Three-party encrypted key exchange: Attacks and a solution.”, ACM SIGOPS Operating Systems Review, 34(4):12?20, Oct. 2000.
    8. C.-L. Lin, H.-M. Sun, M. Steiner and T. Hwang. “Three-party encrypted key exchange without server public-keys”, IEEE Communication Letters 5 (12) , pages 497?499. 2001.
    9. R. Lu and Z. Cao, “Simple three-party key exchange protocol”, Computers Security 26 (1) , pages. 94?97 , 2007.
    10. Junghyun Nam, Juryon Paik, Hyun-Kyu Kang, Ung Mo Kim, Dongho Won, “An off-line dictionary attack on a simple three-party key exchange protocol”, IEEE Communications Letters, Volume 13 Issue 3, March 2009.
    11. M. Abdalla and D. Pointcheval, “Simple password-based encrypted key exchange protocols”, Topics in cryptology ? CT-RSA 2005, LNCS, Springer-Verlag (2005) p. 191?208.
    12. Chin-Chen Chang, Jung-San Lee, Ting-Fang Cheng, “Security design for three-party encrypted key exchange protocol using smart cards”, Proceedings of the 2nd international conference on Ubiquitous information management and communication, January 31 - February 1, 2008.
    13. Hua Guoa, Zhoujun Lia, Yi Mub, Xiyong Zhang, "Cryptanalysis of simple three-party key exchange protocol", Computers & Security Volume 27, Issues 1-2, Pages 16-21, March 2008.
    14. Hyun-Seok Kim, Jin-Young Choi, "Enhanced password-based simple three-party key exchange protocol", Computers & Electrical Engineering, Volume 35, Issue 1, Pages 107-114, January 2009.
    15. Jen-Ho Yanga, Chin-Chen Chang, "An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments", Journal of Systems and Software, Volume 82, Issue 9, Pages 1497-1502, September 2009.
    16. Zuowen Tan, “An Enhanced Three-Party Authentication Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile Commerce Environments”, Journal of Communications, vol.5, no.6, 2010.
    17. Zuowen Tan, "An Improvement on A Three-Party Authentication Key Exchange Protocol Using Elliptic Curve Cryptography", Journal of Convergence Information Technology. Vol. 5, no. 4, 120 p. Jun 2010.
    18. Wang, Minghui, Pan, Junhuaz, Wang, Jiandong, “Password-Based Group Authenticated Key Exchange Protocol: From 3-Party to Group”, Network Computing and Information Security, 14-15 May 2011.
    19. J.W. Byun, S.-M. Lee, D.H. Lee, and D. Hong, "Constant-Round Password-based Group Key Generation for Multi-Layer Ad-Hoc Networks.", In Proc. SPC’06, LNCS 3934, pp. 3-17, Springer-Verlag, 2006.
    20. Junghyun Nam, Paik, J., Ung Mo Kim, Dongho Won, “Security Enhancement to a Password-Authenticated Group Key Exchange Protocol for Mobile Ad-hoc Networks”, Communications Letters, 12 February 2008.
    21. Gang Yao, Hongji Wang, Dengguo Feng, "A Group PAKE Protocol Using Different Passwords", International Conference on Networks Security, Wireless Communications and Trusted Computing, Volume 1, Pages 270 - 273, 25-26 April 2009.


    ▶ Achievements

     
    1. 조응준, 홍충선, "제 3의 노드를 이용한 다중 홉 환경의 센서 노드를 위한 안전한 비밀값 공유 기법", 한국정보처리학회 2010년 추계학술발표대회 논문집(KIPS 2010), 2010년 11월 12일-11월 13일
    2. Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong Seon Hong, Eui-Nam Huh, “An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks”, KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, Vol.2, No.5, pages 265-279, October 2008.
    3. 편희범, 홍충선, "Dual Secret Key 를 이용한 스마트그리드 내의 AMI 시스템 보안 기법", 한국통신학회 2010년 추계종합학술발표대회 논문집(KICS 2010), 2010년 11월 13일
    4. Tran Thanh Dai,and Choong Seon Hong, "Efficient ID-based Threshold Random Key Pre-distribution Scheme for Wireless Sensor Networks", IEICE Transactions on Communications, Vol.E91-B, No.8, pp.2602-2609, Aug. 2008
    5. Md. Mokammel Haque, Al-Sakib Khan Pathan and Choong Seon Hong, "Securing U-Healthcare Sensor Networks using Public Key Based Scheme", Proceedings of the 10th International Conference on Advanced Communication Technology (IEEE ICACT 2008), Volume II, Phoenix Park, Korea, pp. 1108-1111, February 17-20 2008
    6. Md. Mokammel Haque, Al-Sakib Khan Pathan, and Choong Seon Hong, "S-PkSec: An Asymmetric Key Based Security Management Scheme for Sensor Network Operation", 2008 통신망 운용관리 학술대회 (KNOM 2008), 2008년 4월 24-25일
    7. Al-Sakib Khan Pathan, Jae Hyun Ryu, Md. Mokammel Haque, Choong Seon Hong, "Security Management in Wireless Sensor Networks with a Public Key Based Scheme", LNCS4773 (APNOMS 2007), pp 503-506, Oct 2007
    8. Tran Thanh Dai , Choong Seon Hong, "ID-based Multiple Space Key Pre-distribution Scheme for Wireless Sensor Networks", LNCS 4517(WWIC 2007), May 2007
    9. Tran Thanh Dai , Choong Seon Hong, "An ID-based Random Key Pre-distribution Scheme for Wireless Sensor Networks", LNCS 4490(ICCS 2007), May 2007
    10. Md. Mokammel Haque, Al-Sakib Khan Pathan, and Choong Seon Hong,"An Efficient Public Key Based Security Architecture for Wireless Sensor Networks", 27th KIPS Spring Conference 2007, pp. 1098-1099, Seongnam, Korea, 11-12 May 2007
    11. Al-Sakib Khan Pathan, Tran Thanh Dai, and Choong Seon Hong, "A Key Management Scheme with Encoding and Improved Security for Wireless Sensor Networks", LNCS 4317(ICDCIT 2006), pp.102-115, December 2006
    12. Tran Thanh Dai, Al-Sakib Khan Pathan, Choong Seon Hong, "A resource Optimal Key Pre-distribution Scheme with Enhanced Security for Wireless Sensor Networks", LNCS 4238(APNOMS 2006), pp.546-549, September 2006.
    13. Tran Thanh Dai, Cao Trong Hieu, Choong Seon Hong, "An Efficient ID-based Bilinear Key Predistribution Scheme for Distributed Sensor Networks", LNCS 4208(HPCC 2006), pp.260-269, September 2006.
    14. Al-Sakib Khan Pathan, Choong Seon Hong, "A Key-Predistribution-Based Weakly Connected Dominating Set for Secure Clustering in DSN", LNCS 4208(HPCC 2006), pp.270-279, September 2006.
    15. Al-Sakib Khan Pathan, Tran Thanh Dai, Choong Seon Hong, "An Efficient LU Decomposition-based Key Pre-distribution Scheme for Ensuring Security in Wireless Sensor Networks", Proceedings of the 2006 IEEE International Conference on Computer and Information Technology (IEEE CIT 2006), pp.227-232, Seoul, Korea, September 2006.
    16. Tran Thanh Dai, Cao Trong Hieu, Md. Mustafizur Rahman, Choong Seon Hong, "A Robust Pairwise Key Predistribution Scheme Resistant to Common Attacks for Wireless Sensor Networks", Proceedings of 7th WISA 2006, pp.121-135, Jeju Island, Korea, August 2006.
    17. Joon Heo, Choong Seon Hong, “Efficient and Authenticated Key Agreement Mechanism in Low-Rate WPAN Environment”, Proceeding of IEEE ISWPC 2006, pp.30-34, Phuket, Thailand, January 2006.
    18. Tran Thanh Dai, Cao Trong Hieu, Choong Seon Hong, "A Resource-Optimal Key Pre-distribution Scheme for Wireless Sensor Networks", 25th KIPS Spring Conference, Vol.13, No.1, pp.1113-1116, May 2006