A scalable and secure key distribution scheme for group signature based authentication in VANET
- 1 October 2017
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Security issues in vehicular communication have become a huge concern to safeguard increasing applications. A group signature is one of the popular authentication approaches for VANETs (Vehicular ad hoc networks) which can be implemented to secure the vehicular communication. However, securely distributing group keys to fast-moving vehicular nodes is still a challenging problem. In this paper, we propose an efficient key management protocol for group signature based authentication, where a group is extended to a domain with multiple road side units. Our scheme not only provides a secure way to deliver group keys to vehicular nodes, but also ensures security features. The experiment results show that our key distribution scheme is a scalable, efficient and secure solution to vehicular networking.Keywords
This publication has 13 references indexed in Scilit:
- An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networksVehicular Communications, 2016
- Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc NetworksIEEE Transactions on Intelligent Transportation Systems, 2015
- Vehicular communication systems: Enabling technologies, applications, and future outlook on intelligent transportationIEEE Communications Magazine, 2009
- ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular CommunicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- On Data-Centric Trust Establishment in Ephemeral Ad Hoc NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Secure Vehicular Communications Based on Group Signature and ID-Based Signature SchemePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Securing vehicular ad hoc networksJournal of Computer Security, 2007
- Enhancing wireless location privacy using silent periodPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- How to expose an eavesdropperCommunications of the ACM, 1984
- New directions in cryptographyIEEE Transactions on Information Theory, 1976