Lightweight and scalable secure communication in VANET

被引:14
作者
Zhu, Xiaoling [1 ]
Lu, Yang [1 ]
Zhu, Xiaojuan [1 ]
Qiu, Shuwei [1 ]
机构
[1] Hefei Univ Technol, Sch Comp & Informat, Hefei, Peoples R China
基金
中国国家自然科学基金;
关键词
point-to-point communication; secure communication framework; vehicular ad hoc network; key management; broadcast communication; SCHEME;
D O I
10.1080/00207217.2014.938255
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To avoid a message to be tempered and forged in vehicular ad hoc network (VANET), the digital signature method is adopted by IEEE1609.2. However, the costs of the method are excessively high for large-scale networks. The paper efficiently copes with the issue with a secure communication framework by introducing some lightweight cryptography primitives. In our framework, point-to-point and broadcast communications for vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) are studied, mainly based on symmetric cryptography. A new issue incurred is symmetric key management. Thus, we develop key distribution and agreement protocols for two-party key and group key under different environments, whether a road side unit (RSU) is deployed or not. The analysis shows that our protocols provide confidentiality, authentication, perfect forward secrecy, forward secrecy and backward secrecy. The proposed group key agreement protocol especially solves the key leak problem caused by members joining or leaving in existing key agreement protocols. Due to aggregated signature and substitution of XOR for point addition, the average computation and communication costs do not significantly increase with the increase in the number of vehicles; hence, our framework provides good scalability.
引用
收藏
页码:765 / 780
页数:16
相关论文
共 14 条
[1]   On the Performance of Secure Vehicular Communication Systems [J].
Calandriello, Giorgio ;
Papadimitratos, Panos ;
Hubaux, Jean-Pierre ;
Lioy, Antonio .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (06) :898-912
[2]   Provably secure constant round contributory group key agreement in dynamic setting [J].
Dutta, Ratna ;
Barua, Rana .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (05) :2007-2025
[3]   Efficient HMAC-based secure communication for VANETs [J].
Hu, Changhui ;
Chim, Tat Wing ;
Yiu, S. M. ;
Hui, Lucas C. K. ;
Li, Victor O. K. .
COMPUTER NETWORKS, 2012, 56 (09) :2292-2303
[4]   The security and privacy of smart vehicles [J].
Hubaux, JP ;
Capkun, S ;
Luo, J .
IEEE SECURITY & PRIVACY, 2004, 2 (03) :49-55
[5]  
I. S. Association, 2006, IEEE Standard 1609.2
[6]  
Kim K., 2011, Int. J. Network Secur., P229
[7]   Securing vehicular ad hoc networks [J].
Raya, Maxim ;
Hubaux, Jean-Pierre .
JOURNAL OF COMPUTER SECURITY, 2007, 15 (01) :39-68
[8]  
Scott Mike., 2007, Efficient implementation of cryptographic pairings
[9]   Node ID based detection of Sybil attack in mobile wireless sensor network [J].
Sharmila, S. ;
Umamaheswari, G. .
INTERNATIONAL JOURNAL OF ELECTRONICS, 2013, 100 (10) :1441-1454
[10]   A novel secure communication scheme in vehicular ad hoc networks [J].
Wang, Neng-Wen ;
Huang, Yueh-Min ;
Chen, Wei-Ming .
COMPUTER COMMUNICATIONS, 2008, 31 (12) :2827-2837