DECENT: Decentralized and Efficient Key Management to Secure Communication in Dense and Dynamic Environments

被引:6
作者
de Ree, Marcus [1 ,2 ]
Mantas, Georgios [1 ,3 ]
Rodriguez, Jonathan [1 ,2 ]
Otung, Ifiok E. [2 ]
机构
[1] Inst Telecomunicacoes, P-3810193 Aveiro, Portugal
[2] Univ South Wales, Fac Comp Engn & Sci, Pontypridd CF37 1DL, M Glam, Wales
[3] Univ Greenwich, Fac Engn & Sci, Chatham ME4 4TB, England
关键词
Security; Cryptography; Vehicle dynamics; Spread spectrum communication; Servers; Intelligent transportation systems; Smart cities; Ad hoc networks; decentralized systems; key management; multi-hop communication; security;
D O I
10.1109/TITS.2022.3160068
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Intelligent Transportation Systems (ITS), one aspect of the Smart City paradigm, aim to improve the efficiency, convenience, and safety of travelers. The integration of (vehicular) communication technologies allows communication between the on-board communication units (OBUs) of vehicles, roadside units (RSUs), and vulnerable road users (VRUs), and contribute to the efficacy of ITS applications. However, these additional sources of information must be reliable and accurate. Security primitives such as confidentiality, integrity, and authenticity are required, but only achievable when supported with a suitable cryptographic key management scheme. This paper presents the design of a decentralized and efficient key management scheme, abbreviated as the DECENT scheme. This scheme provides secure multi-hop communication in dense and dynamic network environments while functioning in a self-organized manner. Through threshold secret sharing techniques, network nodes act as a distributed trusted third party (TTP) such that a threshold number of nodes can collaborate to execute key management functions. These functions include decentralized node admission and key updating. Novelties include (i) the unique self-healing characteristic, meaning that DECENT is capable of independently recovering from network compromise, and (ii) guidelines for choosing an appropriate security threshold in any deployment scenario which maximizes the level of security while simultaneously guaranteeing that decentralized key management services can be provided.
引用
收藏
页码:7586 / 7598
页数:13
相关论文
共 33 条
  • [1] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [2] [Anonymous], 2005, IEEE INT C NETWORK P
  • [3] BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
  • [4] da Silva E, 2013, IEEE CONF WIREL MOB, P717, DOI 10.1109/WiMOB.2013.6673435
  • [5] de Ree M., 2022, DECENT SIMULATION
  • [6] DISTANT: DIStributed Trusted Authority-based key managemeNT for beyond 5G wireless mobile small cells
    De Ree, Marcus
    Mantas, Georgios
    Rodriguez, Jonathan
    Otung, Ifiok E.
    Verikoukis, Christos
    [J]. COMPUTER COMMUNICATIONS, 2021, 176 : 218 - 233
  • [7] Key Management for Beyond 5G Mobile Small Cells: A Survey
    De Ree, Marcus
    Mantas, Georgios
    Radwan, Ayman
    Mumtaz, Shahid
    Rodriguez, Jonathan
    Otung, Ifiok E.
    [J]. IEEE ACCESS, 2019, 7 : 59200 - 59236
  • [8] DENG H., 2004, Ad Hoc Networks, V2, P291
  • [9] Emerging Technologies for 5G-IoV Networks: Applications, Trends and Opportunities
    Duan, Wei
    Gu, Jinyuan
    Wen, Miaowen
    Zhang, Guoan
    Ji, Yancheng
    Mumtaz, Shahid
    [J]. IEEE NETWORK, 2020, 34 (05): : 283 - 289
  • [10] Feldman P., 1987, PROC 28 ANN S FOUND, P427