A Certificate Enhanced Group Key Framework for Vehicular Ad Hoc Networks

  • Ching-Hung Yeh
  • Meng-Yen Hsieh
  • Kuan-Ching Li
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 214)


Vehicular ad-hoc networks (VANETs) have emerged new prospects in a wide range of researches. Information exchange in VANETs relies on the transmission of packets between vehicles and road-side units. The messages are easily stolen by the malicious users due to the nature of wireless broadcast, and therefore, VANETs need security mechanisms to protect data privacy. Vehicles can be organized into different groups, and members of a vehicular group share a group key to encrypt their messages; even so, they are still exposed to malicious attacks. In this paper, we propose a group key framework with certificate authority in VANETs, where each group has a group leader responsible for the management of members and keys to enhance certificate operations secures the group communication. According to our security analysis and efficiency evaluation, the proposed mechanisms have lightweight overheads in terms of computational and communication requirements, as also to provide better secure vehicular communication than other similar researches in this field.


Vehicular ad hoc network Certificate Group key 



The paper is supported by National Science Council (NSC), Taiwan, under grants NSC101-2221-E-126-006- and NSC101-2221-E-126-002-.


  1. 1.
    Car 2 Car Communication Consortium.
  2. 2.
  3. 3.
    Jubin, J., Tornow, J.D.: The DARPA packet radio network protocols. Proc. IEEE 75(1), 21–32 (1987). doi: 10.1109/PROC.1987.13702 CrossRefGoogle Scholar
  4. 4.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002). doi: 10.1109/MCOM.2002.1024422 Google Scholar
  5. 5.
    Chen, C.-L., Li, C.-T.: Dynamic session-key generation for wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2008 (2008). doi: 10.1155/2008/691571
  6. 6.
    Guo, M.H., Liaw, H.T., Deng, D.J., Chao, H.C.: A cluster-based secure communication mechanism in wireless ad hoc networks. IET Inf. Secur. Special Issue Multi Agent Distrib. Inf. Secur. 4(4), 352–360 (2010)Google Scholar
  7. 7.
    Agrawal, D.P., Cheng, Yi: An improved key distribution mechanism for large-scale hierarchical wireless sensor networks. ACM Secur. Issues Sens. Ad Hoc Netw. 5(1), 35–48 (2007)Google Scholar
  8. 8.
    Fang, S.-Z., Wang, N.-C.: A hierarchical key management scheme for secure group communications in mobile ad hoc networks. J. Syst. Softw. 80(10), 1667–1677 (2007)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Hsieh, M.-Y., Lin, H.-Y., Lai, C.-F., Li, K.-C.: Secure protocols for data propagation and group communication in vehicular networks. EURASIP J. Wirel. Commun. Netw. 2011, 167 (2011). doi: 10.1186/1687-1499-2011-167 CrossRefGoogle Scholar
  10. 10.
    Yeh, C.-H., Huang, Y.-M., Wang, T.-I., Chen, H.: A secure wireless communication scheme for vehicle ad hoc networking. Mob. Netw. Appl. 14(5), 611–624 (2009)CrossRefGoogle Scholar
  11. 11.
    Hossain, I., Mahmud, S.M.: Analysis of group key management protocols for secure multicasting in vehicular software distribution network. In: Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 25 (2007)Google Scholar
  12. 12.
    Verma, M., Huang, D.: SeGCom: secure group communication in VANETs. In: Consumer Communications and Networking Conference, pp. 1–5 (2009)Google Scholar
  13. 13.
    Bala Krishna, M., Doja, M.N.: Symmetric key management and distribution techniques in wireless ad hoc networks. In: 2011 International Conference on Computational Intelligence and Communication Networks (CICN), pp. 727–731, 7–9 Oct 2011. doi:  10.1109/CICN.2011.158
  14. 14.
    Guillou, L.C., Quisquater, J.J.: A paradoxical identity-based signature scheme resulting from zero-knowledge. In: Goldwasser S. (ed.) Proceedings on Advances in Cryptology (CRYPTO’88), vol. 403, pp. 216–231. Springer, New York (1990)Google Scholar
  15. 15.
    Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signature and public key cryptosystems. Commun. ACM 21(2), 120–126 (1978). doi: 10.1145/359340.359342 Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  1. 1.Department of Computer Science and Information EngineeringFar East UniversityTainanTaiwan
  2. 2.Department of Computer Science and Information EngineeringProvidence UniversityTaichungTaiwan

Personalised recommendations