Centralized group key management mechanism for VANET

被引:7
|
作者
Guo, Ming-Huang [1 ]
Liaw, Horng-Twu [1 ]
Deng, Der-Jiunn [2 ]
Chao, Han-Chieh [3 ,4 ]
机构
[1] Shih Hsin Univ, Dept Informat Management, Taipei, Taiwan
[2] Natl Changhua Univ Educ, Dept Comp Sci & Informat Engn, Changhua, Taiwan
[3] Natl Ilan Univ, Dept Elect Engn, Inst Comp Sci & Informat Engn, Ilan, Taiwan
[4] Natl Dong Hwa Univ, Dept Elect Engn, Hualien, Taiwan
关键词
vehicular ad-hoc network; group key management; centralized key management;
D O I
10.1002/sec.676
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The vehicular ad hoc network (VANET) is a novel wireless network and suffers security threats as other networks. Information exchanged in the network might be stolen by malicious users, and some secure mechanisms are needed to provide the privacy. In VANET, the vehicles can be separated to different groups. When vehicles in the same group want to communicate with others, they can use the group key to protect the messages, and the privacy in the group communication is preserved. In this paper, we propose a group key management method with centralized key management scheme for VANET. In each group, there is a group leader, and the group leader will manage the members and the keys. By managing the group keys properly, the communication in the group can be secure. In the performance evaluation and analysis, our proposal provides better rekey mechanisms to related works and also achieves the forward secrecy and backward secrecy. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1035 / 1043
页数:9
相关论文
共 50 条
  • [41] Centralized Group Key Establishment Protocol without a Mutually Trusted Third Party
    Lein Harn
    Ching-Fang Hsu
    Bohan Li
    Mobile Networks and Applications, 2018, 23 : 1132 - 1140
  • [42] Centralized Group Key Establishment Protocol without a Mutually Trusted Third Party
    Harn, Lein
    Hsu, Ching-Fang
    Li, Bohan
    MOBILE NETWORKS & APPLICATIONS, 2018, 23 (05): : 1132 - 1140
  • [43] Security Analysis of Centralized Group Key Management Schemes for Wireless Sensor Networks under Strong Active Outsider Adversary Model
    Chaudhari, Ashwini
    Pareek, Gaurav
    Purushothama, B. R.
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 1576 - 1581
  • [44] A group key recovery mechanism based on logical key hierarchy
    Cho, Taenam
    Lee, Sang-Ho
    Kim, Won
    Journal of Computer Security, 2004, 12 (05) : 711 - 736
  • [45] Centralized Management Mechanism for Cell Outage Compensation in LTE Networks
    Li Wenjing
    Yu Peng
    Jiang Zhengxin
    Li Zifan
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
  • [46] Hydra: A decentralised group key management
    Rafaeli, S
    Hutchison, D
    WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, : 62 - 67
  • [47] Attribute Based Group Key Management
    Nabeel, Mohamed
    Bertino, Elisa
    TRANSACTIONS ON DATA PRIVACY, 2014, 7 (03) : 309 - 336
  • [48] Group key management for overlay multicast
    Jiang, JY
    Lu, KJ
    ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 1054 - 1058
  • [49] New group key management scheme
    Zhang, Yong
    Zhang, Yi
    Wang, Weinong
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (11): : 7 - 9
  • [50] A Survey on Group Key Management Schemes
    Seetha, R.
    Saravanan, R.
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2015, 15 (03) : 3 - 25