Centralized group key management mechanism for VANET

被引:7
作者
Guo, Ming-Huang [1 ]
Liaw, Horng-Twu [1 ]
Deng, Der-Jiunn [2 ]
Chao, Han-Chieh [3 ,4 ]
机构
[1] Shih Hsin Univ, Dept Informat Management, Taipei, Taiwan
[2] Natl Changhua Univ Educ, Dept Comp Sci & Informat Engn, Changhua, Taiwan
[3] Natl Ilan Univ, Dept Elect Engn, Inst Comp Sci & Informat Engn, Ilan, Taiwan
[4] Natl Dong Hwa Univ, Dept Elect Engn, Hualien, Taiwan
关键词
vehicular ad-hoc network; group key management; centralized key management;
D O I
10.1002/sec.676
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The vehicular ad hoc network (VANET) is a novel wireless network and suffers security threats as other networks. Information exchanged in the network might be stolen by malicious users, and some secure mechanisms are needed to provide the privacy. In VANET, the vehicles can be separated to different groups. When vehicles in the same group want to communicate with others, they can use the group key to protect the messages, and the privacy in the group communication is preserved. In this paper, we propose a group key management method with centralized key management scheme for VANET. In each group, there is a group leader, and the group leader will manage the members and the keys. By managing the group keys properly, the communication in the group can be secure. In the performance evaluation and analysis, our proposal provides better rekey mechanisms to related works and also achieves the forward secrecy and backward secrecy. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1035 / 1043
页数:9
相关论文
共 18 条
  • [1] [Anonymous], [No title captured]
  • [2] Dynamic session-key generation for wireless sensor networks
    Chen, Chin-Ling
    Li, Cheng-Ta
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2008, 2008 (1)
  • [3] Chen HC, 2001, J INTERNET TECHNOL, V1, P53
  • [4] An improved key distribution mechanism for large-scale hierarchical wireless sensor networks
    Cheng, Yi
    Agrawal, Dharma P.
    [J]. AD HOC NETWORKS, 2007, 5 (01) : 35 - 48
  • [5] Chiou KZ, 2007, J INTERNET TECHNOL, V1, P313
  • [6] Quantum entanglement and non-locality based secure computation for future communication
    Chou, Y. -H.
    Chen, C. -Y.
    Chao, H. -C.
    Park, J. H.
    Fan, R. -K.
    [J]. IET INFORMATION SECURITY, 2011, 5 (01) : 69 - 79
  • [7] Centralised conference key mechanism with elliptic curve cryptography and Lagrange interpolation for sensor networks
    Deng, D. -J.
    Guo, M. -H.
    [J]. IET COMMUNICATIONS, 2011, 5 (12) : 1727 - 1731
  • [8] Cluster-based secure communication mechanism in wireless ad hoc networks
    Guo, M. -H.
    Liaw, H. -T
    Deng, D. -J.
    Chao, H. -C.
    [J]. IET INFORMATION SECURITY, 2010, 4 (04) : 352 - 360
  • [9] Hossain I, 2007, P 3 IEEE INT C WIR M, P25
  • [10] Adaptive security design with malicious node detection in cluster-based sensor networks
    Hsieh, Meng-Yen
    Huang, Yueh-Min
    Chao, Han-Chieh
    [J]. COMPUTER COMMUNICATIONS, 2007, 30 (11-12) : 2385 - 2400