2019
DOI: 10.3390/s19030482
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Efficient Group Key Agreement Scheme for VANET

Abstract: A vehicular ad hoc network (VANET) is a special mobile ad hoc network that provides vehicle collaborative security applications using intervehicle communication technology. The method enables vehicles to exchange information (e.g., emergency brake). In VANET, there are many vehicle platoon driving scenes, where vehicles with identical attributes (location, organization, etc.) are organized as a group. However, this organization causes the issue of security threats (message confidentiality, identity privacy, et… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(25 citation statements)
references
References 17 publications
0
21
0
1
Order By: Relevance
“…To avoid the security threat of vehicle-to-vehicle communication in the vehicle ad hoc network, an effective GKA scheme is proposed in Liu et al 6 In the scheme, a fixed roadside unit method of negotiating a dynamic session key is adopted, which not only improves the communication performance, but also increases the communication speed. In addition, a batch authentication scheme is also proposed, which effectively implements an anonymous identity verification mechanism and improves the efficiency of identity verification.…”
Section: Related Workmentioning
confidence: 99%
“…To avoid the security threat of vehicle-to-vehicle communication in the vehicle ad hoc network, an effective GKA scheme is proposed in Liu et al 6 In the scheme, a fixed roadside unit method of negotiating a dynamic session key is adopted, which not only improves the communication performance, but also increases the communication speed. In addition, a batch authentication scheme is also proposed, which effectively implements an anonymous identity verification mechanism and improves the efficiency of identity verification.…”
Section: Related Workmentioning
confidence: 99%
“…This results in a system that is highly vulnerable to the injection of bad data, without a reliable way to trace and remove the offending vehicles even in the case such data is detected. For example, among recently proposed group key schemes, schemes by Cui et al [13], Islam et al [14], Liu et al [15], and Paliwal & Chandrakar [16] assign traceable pseudo-IDs to vehicles, but the identities are only authenticated when the vehicle joins (and for some schemes when it leaves) a group. When the vehicles are within the system, they are free to create mayhem.…”
Section: Related Workmentioning
confidence: 99%
“…Some schemes propose to preserve forward and backward secrecy perfectly by updating the group secret for every vehicle that leaves and, in many current schemes, also for joining members [2], [11], [12], [13], [15], [16], [18], [24], [26]. In order to investigate the required update frequency for such a strategy under some common traffic conditions, publicly available traffic count data for three US cities: Houston [41], Seattle [42], and New York [43] were analyzed.…”
Section: B Analysis Of Forward and Backward Secrecymentioning
confidence: 99%
“…The communication cost is defined as the delay taken to broadcast a certain amount of information from GM to provide V2V group members with an updated group key. Table 6 shows the computation time and storage overhead of various key management approaches, namely, a secure and efficient group key agreement (SEGKA) [14], fast-Chinese remainder group key (FCRGK) [11], key-tree Chinese remainder theorem (KCRT) [12], number theory research unit (NTRU) [37], Elgamal group key management (EGKM) [37], VANET group key management (VGKM) [13], and our scalable and secure group key management (2SGKM) method. The notations used for the comparison are defined as: O represents the computation cost in the order of magnitude of the operations, n is the number of group members, τ is the maximum number of children of each node in the tree, and EEA indicates the time taken to find the inverse element of a multiplicative group using the extended Euclidean algorithm.…”
Section: Schemes Key Generation Message Encryption Message Decryptionmentioning
confidence: 99%