DOI QR코드

DOI QR Code

A Design of Group Authentication by using ECDH based Group Key on VANET

VANET에서 ECDH 기반 그룹키를 이용한 그룹간 인증 설계

  • Published : 2012.12.30

Abstract

This paper proposes a group key design based on ECDH(Elliptic Curve Diffie Hellman) which guarantees secure V2V and V2I communication. The group key based on ECDH generates the VGK(Vehicular Group key) which is a group key between vehicles, the GGK(Global Group Key) which is a group key between vehicle groups, and the VRGK(Vehicular and RSU Group key) which is a group key between vehicle and RSUs with ECDH algorithm without an AAA server being used. As the VRGK encrypted with RGK(RSU Group Key) is transferred from the current RSU to the next RSU through a secure channel, a perfect forward secret security is provided. In addition, a Sybil attack is detected by checking whether the vehicular that transferred a message is a member of the group with a group key. And the transmission time of messages and the overhead of a server can be reduced because an unnecessary network traffic doesn't happen by means of the secure communication between groups.

본 논문에서는 안전한 V2V 통신과 V2I 통신을 보장하는 ECDH(Elliptic Curve Diffie Hellman) 기반 그룹키를 제안하였다. 본 논문에서 제안하는 ECDH기반 그룹키는 AAA 서버를 사용하지 않고 차량과 차량사이의 그룹키인 VGK(Vehicular Group Key), 차량 그룹 사이의 그룹키인 GGK(Globak Group Key), 그리고 차량과 RSU사이의 그룹키인 VRGK(Vehicular and RSU Group Key)를 ECDH 알고리즘을 이용하여 생성한다. 차량과 RSU 사이의 그룹키인 VRGK는 현재 RSU에서 다음 RSU에게로 RGK(RSU Group Key)로 암호화하여 안전한 채널을 통하여 전달하기 때문에 완벽한 순방향 기밀(Perfect Forward Secrecy) 보안 서비스가 제공된다. 또한, 메시지를 전송한 차량이 해당 그룹의 구성원인지를 그룹키 이용하여 확인함으로써 Sybil공격을 탐지할 수 있다. 그리고 그룹간의 안전한 통신으로 불필요한 네트워크 트래픽이 발생하지 않으므로 메시지 전송 시간 및 서버의 오버헤드를 줄일 수 있다.

Keywords

References

  1. P. Caballero-Gil, "Security Issues in Vehicular Ad Hoc Network," Mobile Ad-Hoc Networks : Applications, pp.67-88, 2011.
  2. Meng-Yen Hsieh, Hua-i Lin, Chin-Feng Lai and Kuan-Ching Li, "Secure protocol for data propagation and group communication in vehicular networks," Journal on Wireless Communication and Networking, pp.1-16, 2011
  3. P. Celka, N. J. Bershad, and J. M. Vesin, "Stochastic gradient identification of polynomial Wiener systems: Analysis and applicaion," IEEE Transactions on Signal Processing, vol. 49, issue 4, pp.301-313, 2001. https://doi.org/10.1109/78.902112
  4. 강상우, 박세진 "TPM의 Authenticated Boot를 활용한 VANET의 보안 향상 기법 설계," 한국컴퓨터종합학술대회 논문집, Vol.36, No.1(D), pp.216-222, 2009.
  5. Douceur, J. "The Sybil Attack. In: First International Workshop on Peer-to-Peer Systems," March 2002, pp. 251-260 (2002)
  6. Maxim Raya, Panos Papadimitrators, and Jean-Pierre Hubaux, "Securing Vehicular Communications," In Magazine of IEEE Wireless Communications - IVC Specials, EPFL, pp.8-15 Oct. 2006.
  7. IEEE Computer Society, "IEEE Standard for Information technology - Telecommuni -cations and information exchange between systems- Local and metropolitan area networks - Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer(PHY) Specifications," 2007.07
  8. S. Boeyen Entrust, T. Howes Netscape, P. Richard Xcert "Internet X.509 Public Key Infrastructure Operational Protocols- DAPv2," RFC 2559, IETF PKIX Working Group, April. 1999