Skip to main content

A Cloud Based Three Layer Key Management Scheme for VANET

  • Conference paper
  • First Online:
Geo-Spatial Knowledge and Intelligence (GSKI 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 849))

Included in the following conference series:

Abstract

A Cloud Based VANET (Vehicular Ad hoc Network) is a convenient vehicular communication network which is commonly susceptible to various attacks. Many key management schemes for VANETs are presented to solve various security problems. Threshold secret sharing, ECC and Bilinear Pairing computation is efficient approach for the key management design. And PKI is also excellent key management method. In this paper, the above approaches are adopted to construct three layer key management schemes for VANET in order to realize secure communication. After constructing the security structure, we carefully analyse the security performance and efficiency of the scheme in detail. In the end, the conclusion is drawn.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Engoulou, R.G., Pierre, S.: VANET security surveys. Comput. Commun. 44(15), 1–13 (2014)

    Article  Google Scholar 

  2. Cunha, F., Boukerche, A., Viana, L.V.A., Loureiro, A.A.F.: Data communication in vanets: a survey, challenges and applications (2014)

    Google Scholar 

  3. Meshram, S.S., Golait, P.M., Ghodichor, P.M.: Inter-infrastructure and vehicle communication for traffic information sharing in vanet. IOSR J. Comput. Sci. (IOSR-JCE), 5–12 (2014). www.iosrjournals.org

  4. Li, C.T., Hwang, M.S., Chu, Y.P.: A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput. Commun. 31(2), 2803–2814 (2008)

    Article  Google Scholar 

  5. De Fuentes, J.M., Gonzlez-Tablas, A.I., Ribagorda, A.: Overview of security issues in vehicular ad-hoc Networks. In: Handbook of Research on Mobility and Computing. IGI Global, pp. 1–17 (2010). www.igi-global.com

  6. Singh, U., Singh, P.: Review of solutions for securing the vehicular networks. Int. J. comput. Technol. Appl. 2, 1652–1656 (2011)

    Google Scholar 

  7. Blum, J., Eskandarian, A.: The threat of intelligent collisions. IT Prof. 6(1), 24–29 (2004)

    Article  Google Scholar 

  8. Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)

    Article  Google Scholar 

  9. Zhang, C., Lin, X., Lu, R., Ho, P.H.: Rise: an efficient Rsu-aided message authentication scheme in vehicular communication networks. In: ICC. Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19–23 May 2008, pp. 1451–1457 (2008)

    Google Scholar 

  10. Wu, H.T., Hsieh, W.S.: RSU-based message authentication for vehicular ad-hoc networks. Springer Multimed. Tools Appl. 35, 1–13 (2011)

    Google Scholar 

  11. Frey, G., Muller, M., Riick, H.: The Tate pairing and the discrete logarithm applied to elliptic curve

    Google Scholar 

  12. Menezes, A., Okamoto, T., VanstoneL, S.: Reducing elliptic curve logarithms to logarithms in a finite field

    Google Scholar 

  13. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  14. Sun, B., Yu, B.: The three-layered group key management architecture for MANET. In: 11th International Conference on Advanced Communication Technology, ICACT 2009, 15–18 February 2009, vol. 2, pp. 1378–1381 (2009)

    Google Scholar 

  15. Xiong, W.A., Gong, Y.H.: Secure and highly efficient three level key management scheme for MANET. WSEAS Trans. Comput. 10(1), 6–15 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wanan Xiong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xiong, W., Tang, B. (2018). A Cloud Based Three Layer Key Management Scheme for VANET. In: Yuan, H., Geng, J., Liu, C., Bian, F., Surapunt, T. (eds) Geo-Spatial Knowledge and Intelligence. GSKI 2017. Communications in Computer and Information Science, vol 849. Springer, Singapore. https://doi.org/10.1007/978-981-13-0896-3_57

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-0896-3_57

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-0895-6

  • Online ISBN: 978-981-13-0896-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics