| Literature DB >> 30200382 |
Congcong Li1, Shouwen Ji2, Xi Zhang3, Haiping Wang4, Dongfeng Li5, Huiyong Liu6.
Abstract
Autonomous vehicular clouds, as the combination of cloud computing and conventional vehicular ad hoc networks, will provide abundant resources and services by sharing under-utilized resources of future high-end vehicles such as computing power, storage and internet connectivity. Autonomous vehicular clouds will have significant impact if widely implemented in the intelligent transportation system. However, security and privacy issues are still big challenges in autonomous vehicular clouds. In this paper, after analyzing the particularity of autonomous vehicular clouds, we implement a two-layered architecture, in which vehicles are self-organized without the help of roadside units. Then based on the architecture, we put forward an effective key management protocol to distribute a group key efficiently and also provide the authentication and confidentiality that lots of current secure schemes ignore. In addition, according to the different scenarios and security levels we categorize the way of message transmitting into three kinds. At last, with performance evaluations, the proposed protocol can perform more efficiently than other well-known available schemes.Entities:
Keywords: Chinese Reminder Theorem; authentication; certificateless; group key management; vehicular cloud
Year: 2018 PMID: 30200382 PMCID: PMC6165213 DOI: 10.3390/s18092896
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Functions of keys.
| Keys | Functions |
|---|---|
| The secret key between a vehicle and the PKG |
As a partial secret key in authentication process. Calculating the group key. An important secret token to trace the real identity of the vehicle for the CC. |
| Group key |
Broadcasting traffic messages. Excluding the compromised vehicle nodes. |
| The pairwise key between the GL and the vehicle |
Calculating the subgroup key. |
| Subgroup key |
Broadcasting subgroup-sharing messages. Fast authentication for subgroup members. |
Functions of three kinds of information.
| Contents | Security level | Keys | |
|---|---|---|---|
| Public traffic information | Real time traffic information, | Access with all authorized vehicles | Group key, |
| Private custom information | Parking space, | Encryption | Subgroup key, |
| Group sharing information | Private change of member status, | Encryption | Subgroup key, |
Figure 1Transmission path of Public traffic information.
Figure 2Two kinds of transmission path: (a) Subgroup-sharing information; (b) Private custom information.
List of notations.
| Symbol | Descriptions | Symbol | Descriptions |
|---|---|---|---|
|
| A k-bit prime number |
| A secret key of a user |
|
| A finite field with |
| The secret key between a vehicle and the PKG |
|
| An Elliptic Curve over a finite field |
| A public key of a user |
|
| An additive group with the order |
| The pairwise key between the GL and the vehicle |
|
| The order of the group |
| A subgroup key |
|
| The point generator of the group |
| A public key of the PKG |
|
| The pseudo identity of a user |
| A timestamp |
|
| The real identity of a user |
| Exclusive-OR operation |
|
| A group key |
| Message concatenation operation |
|
| A private key of the PKG |
Figure 3Pairwise keys generation process.
Figure 4The different scenarios of data transmitting.
Execution time of different operations.
| Operation | Execution Time (Microsecond) |
|---|---|
|
| 2.6 |
|
| 4.5 |
|
| 2.3 |
|
| 5 |
|
| 12 |
|
| 0.01 |
Figure 5Comparison of computation time when send messages from a vehicle to the center cloud: (a) The computation time at the group leader side; (b) The computation time at the vehicle side.
Figure 6Comparison of computation time when send messages from the center cloud to a vehicle: (a) The computation time at the group leader side; (b) The computation time at the vehicle side.
Figure 7The relationship between repetitive messages and computation time.
Figure 8Computation time of the group leader during key updating.
The comparison of transmission overhead.
| Method | Communication Overhead | Result (byte) | ||
|---|---|---|---|---|
| Vijayakumar’s Scheme | 256 + 256 + 1344 + 256 + 32 + 32 = 2176 bits = 272 bytes | 272 | ||
| Lim’s Scheme | One hop | 256 + 256 + 256 + 32 + 32 = 832 bits = 104 bytes | 104 | |
| N hops | 104 + 121n bytes | 104 + 121n | ||
| Yang’s Scheme | 512 + 256 + 512 + 512 + 32 + 512 + 512 = 2848 bits = 356 bytes | 356 | ||
| Our Scheme | Scenario 1 | V2G | 256 + 512 + 512 + 256 + 32 + 256 + 256 + 32 = 2112 bits = 264 bytes | 264 |
| G2C | 256 + 512 + 512 + 256 + 32 + 256 + 32 = 1856 bits = 232 bytes | 232 | ||
| Scenario 2 | V2G | 256 + 512 + 512 + 256 + 32 +256 + 32 + 32 = 1888 bits = 236 bytes | 236 | |
| G2C | 256 + 512 + 512 + 256 + 32 + 512 + 32 = 2112 bits = 264 bytes | 264 | ||
| G2V | 256 + 256 + 32 + 32 + 32 = 608 bits = 76 bytes | 76 | ||
| Scenario 3 | V2G | 256 + 512 + 512 + 256 + 32 + 256 +512 +32 = 2368 bits = 296 bytes | 296 | |
| G2C | 256 + 512 + 512 + 256 + 32 + 512 + 32 = 2112 bits = 264 bytes | 264 | ||
V2G: A vehicle node sends a message to its group leader; G2C: The group leader sends a messages to the center cloud; G2V: The group leader sends a message to the vehicle node.
Simulation parameter settings.
| Parameters | Values |
|---|---|
| Simulation area |
|
| Wireless protocol | 802.11 p |
| Channel bit rate | 6 Mbs |
| Numbers of vehicles | (30, 60, 90, 120, 150, 180, 210, 240, 270, 300) |
| Vehicles speed | 30–70km/h |
| Simulation time | 100 s |
| Radio coverage | 250 m |
Figure 9Road configuration for simulation.
Figure 10The relationship between group leaders and vehicle nodes.
Figure 11Average messages delay among different scenarios.