An Efficient Decentralized Key Management Mechanism for VANET With Blockchain

被引:135
作者
Ma, Zhuo [1 ]
Zhang, Junwei [1 ]
Guo, Yongzhen [2 ,3 ]
Liu, Yang [1 ]
Liu, Ximeng [4 ,5 ]
He, Wei [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Beijing Inst Technol, Sch Automat, Beijing 100081, Peoples R China
[3] China Software Testing Ctr, Beijing 100048, Peoples R China
[4] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou, Peoples R China
[5] Fuzhou Univ, Key Lab Informat Secur Network Syst, Fuzhou, Fujian, Peoples R China
基金
中国国家自然科学基金;
关键词
Vehicular ad hoc networks; Blockchain; Public key; Smart contracts; Authentication; VANET; key management; blockchain; authen-tication; key agreement; NETWORK ARCHITECTURE; PROTOCOL; SECURE; AUTHENTICATION;
D O I
10.1109/TVT.2020.2972923
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The vehicular ad hoc network (VANET) has been considered as one of the most prominent technologies for improving the efficiency and safety of modern transportation systems. However, VANET will present a unique range of challenges and opportunities for security. In particular, key management, as the footstone to build a practical security framework in VANET, becomes a research hotspot. In this paper, we investigate key management based on blockchain for VANET. We first propose an efficient decentralized key management mechanism for VANET with blockchain (DB-KMM) to automatically realize the registration, update and revocation of user's public key. At the same time, we present a lightweight mutual authentication and key agreement protocol based on the bivariate polynomial. Then, we analyze the security of DB-KMM in the universally composable framework and show that the mechanism can prevent the typical attacks including internal attacks, DoS attacks, public key tampering attacks and collusion attacks. Finally, we analyze the performance of the proposed scheme through experiments and simulation. Experiment results show that DB-KMM has better performance than the existing schemes in terms of communication, storage, computation overhead and latency.
引用
收藏
页码:5836 / 5849
页数:14
相关论文
共 28 条
[1]  
Albarqi A., 2015, J INF SECUR, V6
[2]  
[Anonymous], 2010, IEICE T INF SYST ED, DOI DOI 10.1587/TRANSINF.E93.D.430
[3]   Efficient Tracking Area Management Framework for 5G Networks [J].
Bagaa, Miloud ;
Taleb, Tarik ;
Ksentini, Adlen .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (06) :4117-4131
[4]   Enhancing Cooperative Driving in IEEE 802.11 Vehicular Networks Through Full-Duplex Radios [J].
Bazzi, Alessandro ;
Campolo, Claudia ;
Masini, Barbara M. ;
Molinaro, Antonella ;
Zanella, Alberto ;
Berthet, Antoine O. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (04) :2402-2416
[5]  
Blundo C., 1992, P ANN INT CRYPT C, P471
[6]   Universally composable security: A new paradigm for cryptographic protocols [J].
Canetti, R .
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, :136-145
[7]  
Chuan T. H., 2015, P INT C CYB SEC SMAR, P1
[8]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[9]   A Distributed Key Management Framework with Cooperative Message Authentication in VANETs [J].
Hao, Yong ;
Cheng, Yu ;
Zhou, Chi ;
Song, Wei .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (03) :616-629
[10]  
I. T. S. Committee, 2006, 160922006 IEEE ITS C