V2I Authentication Protocol using Error Correcting Code in VANET Environment

VANET 환경에서 오류수정부호를 사용한 V2I 인증 프로토콜

  • 이수연 (백석문화대학 인터넷정보학부)
  • Received : 2011.11.18
  • Accepted : 2011.12.20
  • Published : 2011.12.30

Abstract

VANET(Vehicular Ad-hoc Network) is a kind of ad hoc networks consist of intelligence vehicular ad nodes, and has become a hot emerging research project in many field. It provide traffic safety, cooperative driving and etc. but has also some security problems that can be occurred in general ad hoc networks. Also, in VANET, vehicles shoul d be able to authenticate each other to securely communicate with network-based infrastructure, and their locations and identifiers should not be exposed from the communication messages. This paper proposes V2I(Vehicular to Infra structure) authentication protocol that anonymity and untraceability of vehicular using Error Correcting Code that ge nerate encoding certification using generation matrix. The proposed scheme based on ECC resolves overhead problems of vehicular secure key management of KDC.

VANET(Vechicular Ad-hoc Network)은 지능형 차량들로 이루어진 애드혹 네트워크 환경으로서 최근 들어 그 연구가 활발하게 진행되고 있는 분야이다. VANET은 원활한 교통 소통, 사고 방지 등 여러 가지 편리한 기능들을 제공하지만 그 기반을 애드혹 네트워크에 두고 있기 때문에 애드혹 망에서 발생하는 보안 문제를 가지고 있고 또한 그 환경적 특성에 따라 추가적인 보안 요구 사항이 존재한다. 본 논문에서는 오류수정부호(Error Correcting Code)의 생성행렬을 사용하여 부호화된 인증서를 생성하고 이를 기반으로 차량의 익명성과 비연결성을 제공하는 V2I(Vehicular to Interface) 인증 프로토콜을 제안한다. 또한 기존 방식에서 차량 등록 및 인증 서버(KDC)의 차량 비밀 키 관리에 대한 오버헤드 문제를 해결하게 되었다.

Keywords

References

  1. G. Calandriello, P. Papadimitratos and J. P. Hubaux, "Efficient and Robust Pseudonymous Authentication in VANET, " In Proc. International Workshop VANET, pp.19-28, 2007.
  2. J. Zhang, L. Ma, W. Su, and Y. Wang, "Privacy-Preserving Authentication Based on Short Group Signature in Vehicular Networks," Proceedings of the First International Symposium on Data, Privacy, and E-Commerce, pp. 138-142,
  3. M..raya and J.Hubaux, "Securing vehicular ad hoc networks," J. of Computer Security, vol. 15, no. 1, pp. 39-68, Jan.2007
  4. X. Lin, X. Sun, P,-H, Ho and X. Shen, "GSIS: A Secure and Privacy Preserving Protocol for Vehicular Coomunications", IEEE Trans, on Vehicular Technology, vol, 56, no.6, pp.3442-3456, 2007.
  5. E. R. Berlekamp, R. J. McEliece, and H. C. A. van Tilborg, " On the Inherent Intractability of Certain Coding Problems," IEEE Trans. on Inform. Theory, vol. 24, no.3, May. 1978, pp. 384-386. https://doi.org/10.1109/TIT.1978.1055873
  6. G. L. Feng and K. K. Tzeng, "A Generalized Euclidean Algorithm for Multisequence Shift-Register Synthesis, " IEEE Trans. on Inform. Theory, vol. 35, no. 3, May 1989, pp. 584-594 https://doi.org/10.1109/18.30981
  7. D. Davis and R. Swick, "Network Security via private-key certificates", Operating System Review, vol.24, 1990, pp. 64-67. https://doi.org/10.1145/94574.94579
  8. ETSI-GSM, Technical Specification GSM 03.20, " Security Related Network Functions," version 3.3.2, 1992.
  9. F.J.MacWilliams and N.J.A.Sloane, The Theory of Error-correcting Codes, North-Holland Publishing Company, 1977.
  10. K. Sampigethaya, M. Li, L. Huang and R. Poovendran, "AMOEBA : Robust Location Privacy Scheme for VANET", IEEE Journal on Selected Areas in Communications 2007.
  11. D.Boneh, X.Boyen, and H.Shacham, "Short group signatures," Advaces in Crytpology, Crypto 2004, LNCS 3027, pp. 41-55, 2004