An Efficient Multiple Session Key Establishment Scheme for VANET Group Integration

被引:0
作者
Lee, Cheng-Chi [1 ,2 ]
Lai, Yan-Ming [3 ]
Cheng, Pu-Jen [3 ]
机构
[1] Fu Jen Catholic Univ, Dept Lib & Infor Sci, Sinjhuang City 24205, Taipei County, Taiwan
[2] Asia Univ, Dept Phot & Comm Engn, Taichung, Taiwan
[3] Natl Taiwan Univ, Grad Inst Networking & Multimedia, 1 Roosevelt Rd Sec 4, Taipei 106, Taiwan
来源
2015 IEEE INTELLIGENT VEHICLES SYMPOSIUM (IV) | 2015年
关键词
ad-hoc; batch key agreement; Chinese remainder theorem; key agreement; VANET; AGREEMENT; PRIVACY; SECURE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
VANET (Vehicular Ad-hoc Network) is the one mainly utilized to create communication networks for vehicles or other roadside devices so that they can quickly share and receive messages. Nevertheless, VANET belongs to the family of wireless networks, which means VANET functions are unsafe. In order to provide safe communication channels, we introduce the key agreements technology to VANET communication. Traditional key agreement schemes, however, are inefficient and would consume too much of the resources especially when they are handling large groups of users or when groups are to be combined. To improve the efficiency, we use the Chinese remainder theorem to build a batch key agreement protocol instead. The improved key for VANET environments is a safer and quicker way to establish communication channels.
引用
收藏
页码:1316 / 1321
页数:6
相关论文
共 18 条
[1]   Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation [J].
Antolino Rivas, David ;
Barcelo-Ordinas, Jose M. ;
Guerrero Zapata, Manel ;
Morillo-Pozo, Julian D. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (06) :1942-1955
[2]   Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels [J].
Aono, T ;
Higuchi, K ;
Ohira, T ;
Komiyama, B ;
Sasaoka, H .
IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, 2005, 53 (11) :3776-3784
[3]  
Chen LD, 2010, ELEC COMP C, P176, DOI [10.1109/ECTC.2010.5490898, 10.1109/ISECS.2010.47]
[4]   SPECS: Secure and privacy enhancing communications schemes for VANETs [J].
Chim, T. W. ;
Yiu, S. M. ;
Hui, Lucas C. K. ;
Li, Victor O. K. .
AD HOC NETWORKS, 2011, 9 (02) :189-203
[5]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[6]   Detecting misbehaviors in VANET with integrated root-cause analysis [J].
Ghosh, Mainak ;
Varghese, Anitha ;
Gupta, Arobinda ;
Kherani, Arzad A. ;
Muthaiah, Skanda N. .
AD HOC NETWORKS, 2010, 8 (07) :778-790
[7]  
Jung-San Lee, 2013, International Journal of Network Security, V15, P405
[8]   Toward a secure batch verification with group testing for VANET [J].
Lee, Cheng-Chi ;
Lai, Yan-Ming .
WIRELESS NETWORKS, 2013, 19 (06) :1441-1449
[9]   IMPROVING TWO NOVEL THREE-PARTY ENCRYPTED KEY EXCHANGE PROTOCOLS WITH PERFECT FORWARD SECRECY [J].
Lee, Cheng-Chi ;
Chang, Rui-Xiang ;
Ko, Hsien-Ju .
INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2010, 21 (06) :979-991
[10]  
Li W., 2011, COMPUT COMMUN, V35, P188