Hybrid Model for Secure Communications and Identity Management in Vehicular Ad Hoc Networks

被引:0
|
作者
Goncalves, Fabio [1 ]
Ribeiro, Bruno [1 ]
Gama, Oscar [1 ]
Barros, Sara [1 ]
Sousa, Susana [1 ]
Hapanchak, Vadym [1 ]
Santos, Alexandre [1 ]
Costa, Antonio [1 ]
Dias, Bruno [1 ]
Macedo, Joaquim [1 ]
Nicolau, Maria Joao [1 ]
机构
[1] Univ Minho, Algoritmi Ctr, Dept Informat, Braga, Portugal
来源
2017 9TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT) | 2017年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intelligent Transportation Systems (ITS) is a set of applications and services that aim to make driving easier, more comfortable and secure, without neglecting user privacy. Vehicular Ad hoc Networks (VANETs) enable the several nodes to communicate between them. These have a very specific set of characteristics, which makes them very challenging, particularly in terms of security. This paper presents an hybrid security model for VANETs and the results taken from its performance evaluation. This hybrid security model relies on Public Key Infrastructure (PKI) and Attribute Based Encryption (ABE) plus Identity Manager (IdM) and has been called VPKIbrID; It combines these technologies, which complement each other, in order to fulfill all major VANET's security requirements. Performance evaluation of the proposed security model was accomplished through a Java implementation, where the elapsed time of each operation was measured. The analysis of VPKIbrID allowed to conclude that PKI operations are more lightweight hut, when the number of vehicles increases (in a broadcast for example), their performance degrades. ABE operations, maintain the same performance despite the number of vehicles. These are heavyweight, but its performance can be improved by using a key caching mechanism. The cryptographic material needed introduces some overhead, which is more noticeable in the methods using PKI (due to the need of sending the certificate in the message). Using ABE with MAC signatures reduces message overhead to less than half.
引用
收藏
页码:409 / 417
页数:9
相关论文
共 50 条
  • [31] An efficient heterogeneous key management approach for secure multicast communications in ad hoc networks
    Kettaf, Noureddine
    Abouaissa, Hafid
    Lorenz, Pascal
    TELECOMMUNICATION SYSTEMS, 2008, 37 (1-3) : 29 - 36
  • [32] An efficient heterogeneous key management approach for secure multicast communications in ad hoc networks
    Noureddine Kettaf
    Hafid Abouaissa
    Pascal Lorenz
    Telecommunication Systems, 2008, 37 : 29 - 36
  • [33] Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks
    1600, Institute of Electrical and Electronics Engineers Inc., United States (17):
  • [34] Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks
    Vijayakumar, Pandi
    Azees, Maria
    Kannan, Arputharaj
    Deborah, Lazarus Jegatha
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2016, 17 (04) : 1015 - 1028
  • [36] An enhanced hybrid key management protocol for secure multicast in ad hoc networks
    Bouassida, MS
    Chrisment, I
    Festor, O
    NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 725 - 742
  • [37] Revocation Management in Vehicular Ad-hoc Networks
    Martin-Fernandez, Francisco
    Caballero-Gil, Pino
    Caballero-Gil, Candido
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1210 - 1217
  • [38] Trust management in vehicular ad hoc networks: a survey
    Souissi, Ilhem
    Ben Azzouna, Nadia
    Berradia, Tahar
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2019, 31 (04) : 230 - 243
  • [39] Modeling protocols for secure group communications in ad hoc networks
    Yasinsac, A
    Davis, JA
    SECURITY PROTOCOLS, 2004, 2845 : 189 - 201
  • [40] Information management in vehicular ad hoc networks: A review
    Kakkasageri, M. S.
    Manvi, S. S.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 39 : 334 - 350