A Session Key Exchange Scheme for Secure Vehicle Communication in V2I-based VANET Environments

V2I 기반의 VANET 환경에서 안전한 차량 통신을 위한 세션 키 교환 기법

  • 유승호 (숭실대학교 정보통신전자공학부) ;
  • 정수환 (숭실대학교 정보통신전자공학부)
  • Published : 2008.08.15

Abstract

This paper proposes a session key exchange scheme for providing secure communication between Vehicles and Infrastructure in VANET. In the current VANET environment, IEEE 802.11i or PKI based mechanism is used to provide secure communication between V2I. However, since the vehicles and the frequent changes of network topology, VANET nodes have some difficulties to exchange the session key using IEEE 802.11i or PKI method. In the proposed scheme, Local Router is newly defined for exchanging the session key between moving vehicles and infrastructure. A session key is generated by XOR operation based on the random values between Local Router and OBU. As a result, the proposed scheme has a noticeable advantage on the fastness of key exchange by exchanging session keys between LR and OBU.

본 논문에서는 VANET 환경에서 차량과 인프라간의 신뢰성 있는 통신을 제공하기 위한 V2I간의 세션 키 교환 기법을 제안한다. 기존의 VANET에서는 V2I간의 안전한 통신을 위해 IEEE 802.11i와 PKI 기반의 보안 메커니즘을 사용하고 있다. 그러나 차량의 고속 이동과 네트워크 환경이 자주 변하는 특성을 가진 VANET에서 짧은 시간에 IEEE 802.11i 또는 PKI 방식을 이용한 V2I 세션 키 교환은 어려움이 있다. 제안하는 기법에서는 빠르게 움직이는 차량과 인프라간의 세션키 교환을 위해 LR (Local Router)을 새롭게 정의하였으며, LR과 OBU 사이의 랜덤 값에 기반 한 XOR 연산을 통해 새로운 세션키를 빠르게 생성하고 교환할 수 있게 하였다. 때문에 제안하는 기법은 VANET 환경에서 AAA 서버 도움 없이도 빠르게 세션키를 교환할 수 있는 이점이 있다.

Keywords

References

  1. R. Mietzner, "COMeSafety," In Proc. of SEVE- COM Workshop, BMW Group, February 2006
  2. SEVECOM, "Secure Vehicular Communication," http://www.sevecom.org, June 2007
  3. S. Corson and J. Macker, "Mobile ad-hoc networking (MANET)," IETF RFC 2051, January 1999
  4. V. Devarapalli, et al., "Network mobility basic support protocol," IETF, RFC 3963, January 2005
  5. D. Johnson, C. Perkins, and J. Arkko, "Mobility support in IPv6," IETF RFC 3775, June 2004
  6. P. McCann, "Mobile IPv6 fast handovers for 802.11 Networks," IETF RFC 4260, November 2005
  7. H. Soliman, C. Castelluccia, K. Dl-Malki, and L. Bellier, "Hierachical mobile IPv6 mobility management (HMIPv6)," RFC 4140, IETF, August 2005
  8. M. Raya, P. Papadimitrators, and J. Hubaux, "Securing vehicular communications," In Magazine of IEEE Wireless Communications-IVC Specials, EPFL, pp.8-15, October 2006 https://doi.org/10.1109/WC-M.2006.250352
  9. IEEE, "IEEE standard for information technology-telecommunications and information exchange between systems-Local and metropolitan area networks- specific requirements Part 11: Wireless LAN medium access control and physical layer specifications Amendment 6: Medium access control security enhancements," IEEE Std 802.11i, July 2004
  10. S. Boeyen, T. Howes, and P. Richard, "Internet X.509 public key infrastructure operational protocols-LDAPv2," RFC 2559, IETF PKIX Working Group, April 1999
  11. IEEE, "IEEE trial-use standard for wireless access in vehicular environments security services for applications and management messages," IEEE Std 1609.2, July 2006
  12. CALM, "Continuous air interface for long and medium range," http://www.tc204wg16.de/, October 2007
  13. IEEE standard, "Part 16: Air interface for fixed and mobile broadband wireless access systems amendment 2: physical and medium access control layers for combined fixed and mobile operation in licensed bands," IEEE 802.16e, 2005
  14. A. Mishra, S. Min Ho, L. Nick, J. Petroni, T. Charles Clancy, and A. William, "Proactive key distribution using neighbor graphs," IEEE Wireless Communications, Volume 11, pp.26-36, February 2004 https://doi.org/10.1109/MWC.2004.1269714
  15. S. Pack and Y. Choi, "Fast handoff scheme based on mobility prediction in public wireless LAN systems," IEE Proceedings-Communications, Volume 151, pp.489-495, October 2004 https://doi.org/10.1049/ip-com:20040834
  16. A. Mukherjee, T. Joshi, and P. Agrawal, "Minimizing re-authentication overheads in infrastructure IEEE 802.11 WLAN networks," IEEE WCNC 2005, Volume 4, pp.13-17, March 2005