Advertisement

A Geographic Location-Based Security Mechanism for Intelligent Vehicular Networks

  • Gongjun Yan
  • Jingli Lin
  • Danda B. Rawat
  • Weiming Yang
Part of the Communications in Computer and Information Science book series (CCIS, volume 135)

Abstract

In Intelligent Vehicular Networks, featured as car-to-car and car-to-infrastructure wireless communication, most applications need important location information or credential information. We address a location-based encryption method that not only ensures messages confidentiality but also authenticates identity and location of communication peers. The authentication of location means that a message can only decrypted by the receiver which is “physically” present inside a decryption region specified by locations, and is moving at a specific speed, acceleration and at a specific time period. A secret key is generated by converting location, time and mobility information (such as speed and acceleration) into a unique number. The determination of the decryption region is addressed in two steps: predicting and updating. The proposed method evaluated by simulations is efficient and secure.

Keywords

Geoencryption GPS Location based encryption intelligent vehicular networks location authentication vehicular ad hoc networks 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Yan, G., Olariu, S.: An efficient geographic location-based security mechanism for vehicular ad hoc networks. In: Proceedings of the 2009 IEEE International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP 2009), October 12-14 (2009)Google Scholar
  2. 2.
    Denning, D., MacDoran, P.: Location-based authentication: Grounding cyberspace for better security. Computer Fraud and Security 1996(2), 12–16 (1996)CrossRefGoogle Scholar
  3. 3.
    Scott, L., Denning, D.E.: Location based encryption technique and some of its applications. In: Proceedings of Institute of Navigation National Technical Meeting 2003, Anaheim, CA, January 22-24, pp. 734–740 (2003)Google Scholar
  4. 4.
    Al-Fuqaha, A., Al-Ibrahim, O.: Geo-encryption protocol for mobile networks. Comput. Commun. 30(11-12), 2510–2517 (2007)CrossRefGoogle Scholar
  5. 5.
    Open source, Simulation of urban mobility, http://sumo.sourceforge.net
  6. 6.
    Yan, G., Ibrahim, K., Weigle, M.C.: Vehicular network simulators. In: Olariu, S., Weigle, M.C. (eds.) Vehicular Networks: From Theory to Practice. Chapman & Hall/CRC (2009)Google Scholar
  7. 7.
    Yan, G., Lin, J., Rawat, D.B., Enyart, J.C.: The role of network and mobility simulators in evaluating vehicular networks. In: Proceedings of The International Conference on Intelligent Computing and Information Science (ICICIS 2011), Chongqing, China, January 8-9 (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Gongjun Yan
    • 1
  • Jingli Lin
    • 2
  • Danda B. Rawat
    • 3
  • Weiming Yang
    • 4
  1. 1.Indiana University KokomoKokomoUSA
  2. 2.Xihua UniversityChengduChina
  3. 3.Old Dominion UniversityNorfolkUSA
  4. 4.Chongqing Technology & Business Univ.ChongqingChina

Personalised recommendations