Identity-based Secure V2V Group Communication Mechanism
管理學院 - 資訊管理系
Department of Information Management
|Thesis Publication Year:||2022|
|Graduation Academic Year:||110|
|Keywords (in Chinese):||車聯網 、廣播加密 、車載隨意行動網路 、群體通訊|
|Keywords (in other languages):||Internet of Vehicles, Broadcast Encryption, Vehicular Ad-Hoc Network, Group Communication|
|Reference times:||Clicks: 62 Downloads: 0|
|School Collection Retrieve National Library Collection Retrieve Error Report|
As applications of the Vehicles communication transits from Vehicular Ad-hoc Network to Internet of Vehicles era, more and more vehicular and traffic applications arise: real-time traffic condition information, emergency accident information...and so forth. Thus, it is crucial to provide secure transmission channels for the data exchange of these IoV applications. IoV also utilizes broadcast communication primarily, especially for V2V communications. Providing fast and efficient broadcast communication has been a hot research topic.
In this thesis, we constructed a secure and efficient broadcast communication scheme for V2V communications. The message sender only needs to encrypt the message once before broadcasting, and all the eligible receivers in the group can decrypt the message after receiving it, thus lowering the computation and transmission resources requirements. Besides the lightweight encryption mechanism, the scheme also preserves privacy and avoids reply and impersonation attacks. We also provide a way to establish the group and re-grouping in the road entrance of limited access roads through Road Side Units to provide the highest re-grouping efficiency. At last, the mechanism also comes with dynamic group member joining, that the joining of a new member does not require re-keying every other member's public key to avoid the need for resource consumption.
 M. N. O. Sadiku, M. Tembely, and S. M. Musa, “Internet of vehicles: An introduction,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 8, p. 11, February 2018.
 A. Dua, N. Kumar, and S. Bawa, “A systematic review on routing protocols for vehicular ad hoc networks,” Vehicular Communications, vol. 1, pp. 33–52, January 2014.
 S. Supriya and B. Bharathi, “Iov-a novel mechanism for initiating secure vehicle data transmission using pso with two phase authentication,” Journal of Ambient Intelligence and Humanized Computing, 2021.
 J. Snoeyink, S. Suri, and G. Varghese, “A lower bound for multicast key distribution,” vol. 1, pp. 422– 431, IEEE, November 2002.
 A. Mansour, K. M. Malik, A. Alkaff, and H. Kanaan, “Alms: Asymmetric lightweight centralized group key management protocol for vanets,” IEEE Transactions on Intelligent Transportation Sys- tems, vol. 22, pp. 1663–1678, March 2021.
 M. Bilal and S. G. Kang, “A secure key agreement protocol for dynamic group,” Cluster Computing, vol. 20, pp. 2779–2792, September 2017.
 M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,” Journal of Computer Security, vol. 15, pp. 39–68, 1 2007.
 L. Zhang, Q. Wu, A. Solanas, and J. Domingo-Ferrer, “A scalable robust authentication protocol for secure vehicular communications,” IEEE Transactions on Vehicular Technology, vol. 59, no. 4, pp. 1606–1617, 2010.
 I. A. Kamil and S. O. Ogundoyin, “A lightweight certificateless authentication scheme and group key agreement with dynamic updating mechanism for lte-v-based internet of vehicles in smart cities,” Journal of Information Security and Applications, vol. 63, p. 102994, 2021.
 K. Lim, K. M. Tuladhar, X. Wang, and W. Liu, “A scalable and secure key distribution scheme for group signature based authentication in vanet,” in 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), pp. 478–483, 2017.
 H. Tan, D. Choi, P. Kim, S. Pan, and I. Chung, “Secure certificateless authentication and road message dissemination protocol in vanets,” Wireless Communications and Mobile Computing, vol. 2018, 2018.
 H. Zhong, S. Zhang, J. Cui, L. Wei, and L. Liu, “Broadcast encryption scheme for v2i communication in vanets,” IEEE Transactions on Vehicular Technology, 2021.
 H. Aliev, H. Kim, and S. Choi, “A scalable and secure group key management method for secure v2v communication,” Sensors (Switzerland), vol. 20, pp. 1–31, November 2020.
 A. Fiat and M. Naor, “Broadcast encryption,” in Advances in Cryptology — CRYPTO’ 93 (D. R. Stinson, ed.), (Berlin, Heidelberg), pp. 480–491, Springer Berlin Heidelberg, 1994.
 D. Boneh and M. Franklin, “An efficient public key traitor tracing scheme,” in Advances in Cryptology — CRYPTO’ 99 (M. Wiener, ed.), (Berlin, Heidelberg), pp. 338–353, Springer Berlin Heidelberg, 1999.
 D. Boneh, C. Gentry, and B. Waters, “Collusion resistant broadcast encryption with short ciphertexts and private keys,” in Advances in Cryptology – CRYPTO 2005 (V. Shoup, ed.), (Berlin, Heidelberg), pp. 258–275, Springer Berlin Heidelberg, 2005.
 C. Delerablée, “Identity-based broadcast encryption with constant size ciphertexts and private keys,” in Advances in Cryptology – ASIACRYPT 2007 (K. Kurosawa, ed.), (Berlin, Heidelberg), pp. 200–215, Springer Berlin Heidelberg, 2007.