Browse > Article
http://dx.doi.org/10.9717/kmms.2013.16.2.180

Key Exchange Protocol based on Signcryption in SMART Highway  

Kim, Su-Hyun (순천향대학교 컴퓨터소프트웨어공학과)
Lee, Im-Yeong (순천향대학교 컴퓨터소프트웨어공학과)
Publication Information
Abstract
The SMART Highway project combines road construction with advanced technology and vehicle telecommunications. Its expected outcome is a world-leading intelligent road that is green, fast, and comfortable. A vehicular ad-hoc network(VANET) is the core technology of the SMART Highway, whose transport operation is based on road vehicles. The VANET is a next-generation networking technology that enables wireless communication between vehicles or between vehicles and a road side unit(RSU). In the VANET system, a vehicle accident is likely to cause a serious disaster. Therefore, some information on safety is essential to serve as the key exchange protocol for communication between vehicles. However, the key exchange scheme of the general network proposed for a fast-moving communication environment is unsuitable for vehicles. In this paper, communication between multiple vehicles more efficient and secure key exchange at the vehicle certification by signcryption is proposed.
Keywords
SMART Highway; Vehicular Ad-hoc Network; Key Exchange; Signcryption;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 이기영, 이혁준, "스마트하이웨이를 위한 유비쿼터스 교통정보 서비스 시스템," 정보과학회지, 제27권, 제9호, pp. 34-40, 2009.   과학기술학회마을
2 이지훈, 김대엽, "차량 간 통신을 이용한 저비용 사고 위험 방지 기술에 관한 연구," 멀티미디어학회논문지, 제15권, 제19호, pp. 1221-1227, 2012.   과학기술학회마을   DOI   ScienceOn
3 M. Raya, P. Papadimitrators, and J. Hubaux, "Securing Vehicular Communications," Magazine of IEEE Wireless Communications-IVC Specials, EPFL, Volume 13, Issue 5, pp. 8-15, 2006.
4 Y. Zheng, "Digital Signcryption or How to Achieve Cost (Signature and Encryption) << Cost(Signature)+Cost(Encryption)," Advances in Cryptology, Proc. CRYPTO'97, LNCS, Vol. 1294, pp. 165-179, 1997.
5 Y. Zheng, "Shortened Digital Signature, Signcryption and Compact and Unforgeable Key Agreement Schemes," IEEE P1363a: Standard Specifications for Public-key Crypto graphy : Additional Techiques, 1998.
6 B. Bloom, "Space/Time Trade-Offs in Hash Coding with Allowable Errors," Comm. ACM, Vol. 13, No. 7, pp. 422-426, 1970.   DOI
7 J. Zhang, L. Ma, W. Su, and Y. Wang, "Privacy-Preserving Authentication Based on Short Group Signature in Vehicular Networks," Proc. the First International Symposium on Data, Privacy, and E- Commerce, pp. 138-142, 2007.
8 Y. Hao, Y. Cheng, and K. Ren, "Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs," Proc. IEEE Global Telecommunications Conference, pp. 1-5, 2008.
9 Y. Sun, Z. Feng, Q. Hu, and J. Su, "An Efficient Distributed Key Management Scheme for Group-Signature Based Anonymous Authentication in VANET," Security and Communication Networksm, Vol. 5, Issue. 1, pp. 79-86, 2012.   DOI