A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks

aut.relation.endpage9584
aut.relation.issue12en_NZ
aut.relation.journalIEEE Transactions on Vehicular Technologyen_NZ
aut.relation.startpage9570
aut.relation.volume65en_NZ
dark.contributor.authorTan, Hen_NZ
dark.contributor.authorMa, Men_NZ
dark.contributor.authorLabiod, Hen_NZ
dark.contributor.authorBoudguiga, Aen_NZ
dark.contributor.authorZhang, Jen_NZ
dark.contributor.authorChong, PHJen_NZ
dc.date.accessioned2017-09-27T22:22:53Z
dc.date.available2017-09-27T22:22:53Z
dc.date.copyright2016-12-01en_NZ
dc.date.issued2016-12-01en_NZ
dc.description.abstractPublic key infrastructure (PKI) is the most widely used security mechanism for securing communications over the network. However, there are known performance issues, making it unsuitable for use in vehicular networks. In this paper, we propose a secure and authenticated key management protocol (SA-KMP) to overcome the shortcomings of the PKI. The SA-KMP scheme distributes repository containing the bindings of the entity's identity and its corresponding public key to each vehicle and road side unit. By doing so, certificate exchanges and certificate revocation lists are eliminated. Furthermore, the SA-KMP scheme uses symmetric keys derived based on a 3-D-matrix-based key agreement scheme to reduce the high computational costs of using asymmetric cryptography. We demonstrate the efficiency of the SA-KMP through performance evaluations in terms of transmission and storage overhead, network latency, and key generation time. Analytical results show that the SA-KMP is more scalable and outperforms the certificate-based PKI. Simulation results indicate that the key generation time of the SA-KMP scheme is less than that of the existing Elliptic Curve Diffie-Hellman and Diffie-Hellman protocols. In addition, we use Proverif to prove that the SA-KMP scheme is secure against an active attacker under the Dolev and Yao model and further show that the SA-KMP scheme is secure against denial of service, collusion attacks, and a wide range of other malicious attacks.en_NZ
dc.identifier.citationIEEE Transactions on Vehicular Technology, 65(12), 9570-9584.
dc.identifier.doi10.1109/TVT.2016.2621354en_NZ
dc.identifier.issn0018-9545en_NZ
dc.identifier.urihttps://hdl.handle.net/10292/10836
dc.publisherIEEE
dc.relation.urihttp://ieeexplore.ieee.org/document/7707427/
dc.rightsCopyright © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
dc.rights.accessrightsOpenAccessen_NZ
dc.subjectCertificate-less PKI; Hybrid Cryptosystems; Proverif; 3D Matrix based Key Agreement
dc.titleA Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networksen_NZ
dc.typeJournal Article
pubs.elements-id221407
pubs.organisational-data/AUT
pubs.organisational-data/AUT/Design & Creative Technologies
pubs.organisational-data/AUT/Design & Creative Technologies/Engineering, Computer & Mathematical Sciences
pubs.organisational-data/AUT/PBRF
pubs.organisational-data/AUT/PBRF/PBRF Design and Creative Technologies
pubs.organisational-data/AUT/PBRF/PBRF Design and Creative Technologies/PBRF ECMS
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
2016-IEEE-TVT-A+Secure+and+Authenticated+Key+Management.pdf
Size:
1.97 MB
Format:
Adobe Portable Document Format
Description:
Journal article
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
AUT Grant of Licence for Scholarly Commons Feb2017.pdf
Size:
239.25 KB
Format:
Adobe Portable Document Format
Description: