Basic Search / Detailed Display

Author: 林子鈞
Tzu-Chun Lin
Thesis Title: 基於車輛身分的安全車對車群體通訊機制
Identity-based Secure V2V Group Communication Mechanism
Advisor: 羅乃維
Nai-Wei Lo
Committee: 楊傳凱
Chuan-Kai Yang
Jheng-Jia Huang
Degree: 碩士
Department: 管理學院 - 資訊管理系
Department of Information Management
Thesis Publication Year: 2022
Graduation Academic Year: 110
Language: 英文
Pages: 35
Keywords (in Chinese): 車聯網廣播加密車載隨意行動網路群體通訊
Keywords (in other languages): Internet of Vehicles, Broadcast Encryption, Vehicular Ad-Hoc Network, Group Communication
Reference times: Clicks: 62Downloads: 0
School Collection Retrieve National Library Collection Retrieve Error Report
  • 隨著車載隨意行動網路從車用網路邁入車聯網時代,透過裝置間訊息交換而延伸出來的的應用也越來越多,例如透過車輛的位置與速度獲得交通流暢度資訊,或是緊急事故資訊發布等等,而乘載這些資訊的車聯網應用的安全通訊傳輸管道也因此越來越重要。車聯網環境時常仰賴於廣播通訊,如何在安全又有效率的狀況下進行廣播通訊,成為一個很重要的研究課題。


    As applications of the Vehicles communication transits from Vehicular Ad-hoc Network to Internet of Vehicles era, more and more vehicular and traffic applications arise: real-time traffic condition information, emergency accident information...and so forth. Thus, it is crucial to provide secure transmission channels for the data exchange of these IoV applications. IoV also utilizes broadcast communication primarily, especially for V2V communications. Providing fast and efficient broadcast communication has been a hot research topic.

    In this thesis, we constructed a secure and efficient broadcast communication scheme for V2V communications. The message sender only needs to encrypt the message once before broadcasting, and all the eligible receivers in the group can decrypt the message after receiving it, thus lowering the computation and transmission resources requirements. Besides the lightweight encryption mechanism, the scheme also preserves privacy and avoids reply and impersonation attacks. We also provide a way to establish the group and re-grouping in the road entrance of limited access roads through Road Side Units to provide the highest re-grouping efficiency. At last, the mechanism also comes with dynamic group member joining, that the joining of a new member does not require re-keying every other member's public key to avoid the need for resource consumption.

    RecommendationLetter ... i ApprovalLetter ... ii Abstract in Chinese ... iii Abstract in English ... iv Acknowledgements ... v Contents ... vi List of Figures ... viii List of Tables ... ix 1 Introduction ... 1 2 Preliminaries ... 4 2.1 BilinearMaps ... 4 2.2 Identity-Based Broadcast Encryption . . . 4 2.3 Public Key Encryption ... 5 3 RelatedWork ... 8 4 ProposedMechanism ... 11 4.1 RSUBeaconVerificationProtocol . . . 13 4.2 GroupEstablishmentPhase... 13 4.3 GroupKeySetupPhase... 15 4.4 EncryptionPhase ... 16 4.5 DecryptionPhase ... 17 4.6 VehicleLeavingGroup ... 17 4.7 DynamicGroupJoining... 18 5 SecurityAnalysis ... 20 6 Conclusions ... 22 References... 23

    [1] M. N. O. Sadiku, M. Tembely, and S. M. Musa, “Internet of vehicles: An introduction,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 8, p. 11, February 2018.
    [2] A. Dua, N. Kumar, and S. Bawa, “A systematic review on routing protocols for vehicular ad hoc networks,” Vehicular Communications, vol. 1, pp. 33–52, January 2014.
    [3] S. Supriya and B. Bharathi, “Iov-a novel mechanism for initiating secure vehicle data transmission using pso with two phase authentication,” Journal of Ambient Intelligence and Humanized Computing, 2021.
    [4] J. Snoeyink, S. Suri, and G. Varghese, “A lower bound for multicast key distribution,” vol. 1, pp. 422– 431, IEEE, November 2002.
    [5] A. Mansour, K. M. Malik, A. Alkaff, and H. Kanaan, “Alms: Asymmetric lightweight centralized group key management protocol for vanets,” IEEE Transactions on Intelligent Transportation Sys- tems, vol. 22, pp. 1663–1678, March 2021.
    [6] M. Bilal and S. G. Kang, “A secure key agreement protocol for dynamic group,” Cluster Computing, vol. 20, pp. 2779–2792, September 2017.
    [7] M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,” Journal of Computer Security, vol. 15, pp. 39–68, 1 2007.
    [8] L. Zhang, Q. Wu, A. Solanas, and J. Domingo-Ferrer, “A scalable robust authentication protocol for secure vehicular communications,” IEEE Transactions on Vehicular Technology, vol. 59, no. 4, pp. 1606–1617, 2010.
    [9] I. A. Kamil and S. O. Ogundoyin, “A lightweight certificateless authentication scheme and group key agreement with dynamic updating mechanism for lte-v-based internet of vehicles in smart cities,” Journal of Information Security and Applications, vol. 63, p. 102994, 2021.
    [10] K. Lim, K. M. Tuladhar, X. Wang, and W. Liu, “A scalable and secure key distribution scheme for group signature based authentication in vanet,” in 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), pp. 478–483, 2017.
    [11] H. Tan, D. Choi, P. Kim, S. Pan, and I. Chung, “Secure certificateless authentication and road message dissemination protocol in vanets,” Wireless Communications and Mobile Computing, vol. 2018, 2018.
    [12] H. Zhong, S. Zhang, J. Cui, L. Wei, and L. Liu, “Broadcast encryption scheme for v2i communication in vanets,” IEEE Transactions on Vehicular Technology, 2021.
    [13] H. Aliev, H. Kim, and S. Choi, “A scalable and secure group key management method for secure v2v communication,” Sensors (Switzerland), vol. 20, pp. 1–31, November 2020.
    [14] A. Fiat and M. Naor, “Broadcast encryption,” in Advances in Cryptology — CRYPTO’ 93 (D. R. Stinson, ed.), (Berlin, Heidelberg), pp. 480–491, Springer Berlin Heidelberg, 1994.
    [15] D. Boneh and M. Franklin, “An efficient public key traitor tracing scheme,” in Advances in Cryptology — CRYPTO’ 99 (M. Wiener, ed.), (Berlin, Heidelberg), pp. 338–353, Springer Berlin Heidelberg, 1999.
    [16] D. Boneh, C. Gentry, and B. Waters, “Collusion resistant broadcast encryption with short ciphertexts and private keys,” in Advances in Cryptology – CRYPTO 2005 (V. Shoup, ed.), (Berlin, Heidelberg), pp. 258–275, Springer Berlin Heidelberg, 2005.
    [17] C. Delerablée, “Identity-based broadcast encryption with constant size ciphertexts and private keys,” in Advances in Cryptology – ASIACRYPT 2007 (K. Kurosawa, ed.), (Berlin, Heidelberg), pp. 200–215, Springer Berlin Heidelberg, 2007.

    無法下載圖示 Full text public date 2024/02/08 (Intranet public)
    Full text public date 2024/02/08 (Internet public)
    Full text public date 2024/02/08 (National library)