A Geographic Location-Based Security Mechanism for Intelligent Vehicular Networks
In Intelligent Vehicular Networks, featured as car-to-car and car-to-infrastructure wireless communication, most applications need important location information or credential information. We address a location-based encryption method that not only ensures messages confidentiality but also authenticates identity and location of communication peers. The authentication of location means that a message can only decrypted by the receiver which is “physically” present inside a decryption region specified by locations, and is moving at a specific speed, acceleration and at a specific time period. A secret key is generated by converting location, time and mobility information (such as speed and acceleration) into a unique number. The determination of the decryption region is addressed in two steps: predicting and updating. The proposed method evaluated by simulations is efficient and secure.
KeywordsGeoencryption GPS Location based encryption intelligent vehicular networks location authentication vehicular ad hoc networks
Unable to display preview. Download preview PDF.
- 1.Yan, G., Olariu, S.: An efficient geographic location-based security mechanism for vehicular ad hoc networks. In: Proceedings of the 2009 IEEE International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP 2009), October 12-14 (2009)Google Scholar
- 3.Scott, L., Denning, D.E.: Location based encryption technique and some of its applications. In: Proceedings of Institute of Navigation National Technical Meeting 2003, Anaheim, CA, January 22-24, pp. 734–740 (2003)Google Scholar
- 5.Open source, Simulation of urban mobility, http://sumo.sourceforge.net
- 6.Yan, G., Ibrahim, K., Weigle, M.C.: Vehicular network simulators. In: Olariu, S., Weigle, M.C. (eds.) Vehicular Networks: From Theory to Practice. Chapman & Hall/CRC (2009)Google Scholar
- 7.Yan, G., Lin, J., Rawat, D.B., Enyart, J.C.: The role of network and mobility simulators in evaluating vehicular networks. In: Proceedings of The International Conference on Intelligent Computing and Information Science (ICICIS 2011), Chongqing, China, January 8-9 (2011)Google Scholar