CFP last date
20 January 2025
Reseach Article

Overview of Secure Conference Scheme for Mobile Communications

Published on May 2014 by Nilesh M. Shidurkar
National Level Technical Conference X-PLORE 2014
Foundation of Computer Science USA
XPLORE2014 - Number 1
May 2014
Authors: Nilesh M. Shidurkar
9488666e-4744-40b8-8dbd-96fdf39a7cf1

Nilesh M. Shidurkar . Overview of Secure Conference Scheme for Mobile Communications. National Level Technical Conference X-PLORE 2014. XPLORE2014, 1 (May 2014), 9-12.

@article{
author = { Nilesh M. Shidurkar },
title = { Overview of Secure Conference Scheme for Mobile Communications },
journal = { National Level Technical Conference X-PLORE 2014 },
issue_date = { May 2014 },
volume = { XPLORE2014 },
number = { 1 },
month = { May },
year = { 2014 },
issn = 0975-8887,
pages = { 9-12 },
numpages = 4,
url = { /proceedings/xplore2014/number1/16165-1413/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Level Technical Conference X-PLORE 2014
%A Nilesh M. Shidurkar
%T Overview of Secure Conference Scheme for Mobile Communications
%J National Level Technical Conference X-PLORE 2014
%@ 0975-8887
%V XPLORE2014
%N 1
%P 9-12
%D 2014
%I International Journal of Computer Applications
Abstract

A Secure digital conference scheme allows a group of people to communicate safely in different way. Dynamic participation is a key feature of the secure conference schemes that allows new conferees to join and the old conferees to leave. The conference key distribution scheme (CKDS) enables three or more parties to derive a common conference key to protect the conversation content in their conference. In this paper we study a conference scheme for mobile communications and find that the scheme is insecure against the replay attack. With our replay attack, an attacker with a compromised conference key can cause the conferees to reuse the compromised conference key, which in turn completely reveals subsequent conversation content.

References
  1. H. C. Williams, "A modification of the RSA public key encryption procedure," IEEE Trans. Inform. Theory, vol. 26, pp. 726–729, Nov. 1980.
  2. I. Ingemarsson, D. T. Tang, and C. K. Wong, "A conference key distribution system," IEEE Trans. Inform. Theory, vol. IT-28, pp. 714–720, Sept. 1982.
  3. K. Koyama and K. Ohta, "Identity-based conference key distribution system," in Proc. CRYPTO'87, Santa Barbara, CA, Aug. 1987, pp. 194–202.
  4. M. J. Beller, L. F. Chang, and Y. Yacobi, "Privacy and authentication on a portable communications system," IEEE J. Select. Areas Commun. , vol. 11, pp. 821–829, Aug. 1993.
  5. M. S. Hwang andW. P. Yang, "Conference key distribution schemes for secure digital mobile communications," IEEE J. Select. Areas Commun. , vol. 13, pp. 416–420, Feb. 1995.
  6. M. S. Hwang, "Dynamic participation in a secure conference scheme for mobile communications," IEEE Trans. Veh. Technol. , vol. 48, pp. 1469–1474, Sept. 1999.
  7. D K. F. Hwang and C. C. Chang, "A self-encryption mechanism for authentication of roaming and teleconference services," IEEE Trans. Wireless Commun. , vol. 2, no. 2, pp. 400-407, Mar. 2003.
  8. X. Yi, C. K. Siew, and C. H. Tan, "A secure and efficient conference scheme for mobile communications," IEEE Trans. Veh. Commun. , vol. 52, pp. 784-793, July 2003.
  9. X. Yi, C. K. Siew, C. H. Tan, and Y. Ye, "A secure conference scheme for mobile communications," IEEE Trans. Wireless Commun. , vol. 2, pp. 1168-1177, Nov. 2003.
  10. Feng Bao, "Analysis of a secure Conference Scheme for mobile communication," IEEE Trans. Wireless Commun. , vol. 5, no. 8, Aug. 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Communications Conference Scheme Security Dynamic Participation