{"title":"安全的双密钥建立在车载网络","authors":"S. Al-Shareeda, F. Özgüner","doi":"10.1109/ICCVE.2014.7297508","DOIUrl":null,"url":null,"abstract":"In vehicular networks, automobiles assist each other in accident avoidance and information sharing. However, securing the On Board Unit (OBU)'s stored and communicated data is not an easy task. In this paper, we suggest a tactic, which combines an elegant key pre-distribution scheme [16] with a somewhat homomorphic encrypting system (Boneh-Goh-Nissim) [17] to provide muddled secure session keys that can be used for encrypting transferred data in case of sudden disappearance of the vehicle to infrastructure (V2I) service. To investigate the appropriateness of the suggested model, in-depth analysis in terms of OBU storage and time overhead has been conducted and the analytical results show that our scenario is practical and fast only when some idealistic assumptions are made for small network sizes and compromisation rates.","PeriodicalId":171304,"journal":{"name":"2014 International Conference on Connected Vehicles and Expo (ICCVE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Secure pairwise key establishment in vehicular networks\",\"authors\":\"S. Al-Shareeda, F. Özgüner\",\"doi\":\"10.1109/ICCVE.2014.7297508\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In vehicular networks, automobiles assist each other in accident avoidance and information sharing. However, securing the On Board Unit (OBU)'s stored and communicated data is not an easy task. In this paper, we suggest a tactic, which combines an elegant key pre-distribution scheme [16] with a somewhat homomorphic encrypting system (Boneh-Goh-Nissim) [17] to provide muddled secure session keys that can be used for encrypting transferred data in case of sudden disappearance of the vehicle to infrastructure (V2I) service. To investigate the appropriateness of the suggested model, in-depth analysis in terms of OBU storage and time overhead has been conducted and the analytical results show that our scenario is practical and fast only when some idealistic assumptions are made for small network sizes and compromisation rates.\",\"PeriodicalId\":171304,\"journal\":{\"name\":\"2014 International Conference on Connected Vehicles and Expo (ICCVE)\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Connected Vehicles and Expo (ICCVE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCVE.2014.7297508\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Connected Vehicles and Expo (ICCVE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCVE.2014.7297508","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure pairwise key establishment in vehicular networks
In vehicular networks, automobiles assist each other in accident avoidance and information sharing. However, securing the On Board Unit (OBU)'s stored and communicated data is not an easy task. In this paper, we suggest a tactic, which combines an elegant key pre-distribution scheme [16] with a somewhat homomorphic encrypting system (Boneh-Goh-Nissim) [17] to provide muddled secure session keys that can be used for encrypting transferred data in case of sudden disappearance of the vehicle to infrastructure (V2I) service. To investigate the appropriateness of the suggested model, in-depth analysis in terms of OBU storage and time overhead has been conducted and the analytical results show that our scenario is practical and fast only when some idealistic assumptions are made for small network sizes and compromisation rates.