Browse > Article
http://dx.doi.org/10.9723/jksiis.2012.17.7.051

A Design of Group Authentication by using ECDH based Group Key on VANET  

Lee, Byung Kwan (관동대학교 컴퓨터학과)
Jung, Yong Sik (관동대학교 의료경영학과)
Jeong, Eun Hee (강원대학교 지역경제학과)
Publication Information
Journal of Korea Society of Industrial Information Systems / v.17, no.7, 2012 , pp. 51-57 More about this Journal
Abstract
This paper proposes a group key design based on ECDH(Elliptic Curve Diffie Hellman) which guarantees secure V2V and V2I communication. The group key based on ECDH generates the VGK(Vehicular Group key) which is a group key between vehicles, the GGK(Global Group Key) which is a group key between vehicle groups, and the VRGK(Vehicular and RSU Group key) which is a group key between vehicle and RSUs with ECDH algorithm without an AAA server being used. As the VRGK encrypted with RGK(RSU Group Key) is transferred from the current RSU to the next RSU through a secure channel, a perfect forward secret security is provided. In addition, a Sybil attack is detected by checking whether the vehicular that transferred a message is a member of the group with a group key. And the transmission time of messages and the overhead of a server can be reduced because an unnecessary network traffic doesn't happen by means of the secure communication between groups.
Keywords
VANET; V2V; V2I; Group Key; Group Communication; Authentication; ECDH; VGK; GGK; VRGK;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. Caballero-Gil, "Security Issues in Vehicular Ad Hoc Network," Mobile Ad-Hoc Networks : Applications, pp.67-88, 2011.
2 Meng-Yen Hsieh, Hua-i Lin, Chin-Feng Lai and Kuan-Ching Li, "Secure protocol for data propagation and group communication in vehicular networks," Journal on Wireless Communication and Networking, pp.1-16, 2011
3 P. Celka, N. J. Bershad, and J. M. Vesin, "Stochastic gradient identification of polynomial Wiener systems: Analysis and applicaion," IEEE Transactions on Signal Processing, vol. 49, issue 4, pp.301-313, 2001.   DOI
4 강상우, 박세진 "TPM의 Authenticated Boot를 활용한 VANET의 보안 향상 기법 설계," 한국컴퓨터종합학술대회 논문집, Vol.36, No.1(D), pp.216-222, 2009.
5 Douceur, J. "The Sybil Attack. In: First International Workshop on Peer-to-Peer Systems," March 2002, pp. 251-260 (2002)
6 Maxim Raya, Panos Papadimitrators, and Jean-Pierre Hubaux, "Securing Vehicular Communications," In Magazine of IEEE Wireless Communications - IVC Specials, EPFL, pp.8-15 Oct. 2006.
7 IEEE Computer Society, "IEEE Standard for Information technology - Telecommuni -cations and information exchange between systems- Local and metropolitan area networks - Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer(PHY) Specifications," 2007.07
8 S. Boeyen Entrust, T. Howes Netscape, P. Richard Xcert "Internet X.509 Public Key Infrastructure Operational Protocols- DAPv2," RFC 2559, IETF PKIX Working Group, April. 1999