摘要
现有的采用密钥树结构的群密钥管理方案在降低群密钥管理开销方面不彻底,且没有考虑车辆的身份隐私.笔者提出一个面向服务的隐私保护群密钥管理方案,利用车辆假名绑定服务保护身份隐私,基于中国剩余定理设计群密钥因子,使服务群的成员能以一个模运算获得群密钥.对其进行分析表明:笔者方案比经典方案具有更高的安全性、较少的计算和通信开销.
Existing group key management schemes used the key tree based structures to reduce rekeying overhead.But it was not thorough and ignored the identity privacy of vehicles.A service-oriented privacy-preserving group key management(PVGKM)scheme was proposed in this paper.It used vehicles' pseudonyms to bind subscriptions for protecting the identity privacy of vehicles,and designed a group key factor based on the Chinese remainder theorem so that the service group members could get the group key with one modulo division operation.Security and performance analysis showed that the proposed scheme had higher security,less computation and communication cost than the classical schemes.
引文
[1]AL-SULTAN S,AL-DOORI M M,AL-BAYATTI A H,et al.A comprehensive survey on vehicular Ad Hoc network[J].Journal of Network and Computer Applications,2014,37(4):380-392.
[2]BALI R S,KUMAR N.Secure clustering for efficient data dissemination in vehicular cyber-physical systems[J].Future Generation Computer Systems,2016,56(9):476-492.
[3]PAPADIMITRATOS P,BUTTYAN L,HOLCZER T S,et al.Secure vehicular communication systems:design and architecture[J].IEEE Communications Magazine,2008,46(11):100-109.
[4]PARK M H,GWON G P,SEO S W,et al.RSU-based distributed key management(RDKM)for secure vehicular multicast communications[J].IEEE Journal on Selected Areas in Communications,2011,29(3):644-658.
[5]PARK Y H,SEO S W.Fast and secure group key dissemination scheme for out-of-range V2Icommunication[J].IEEE Transactions on Vehicular Technology,2015,64(12):5642-5652.
[6]JE D H,CHOI Y H,SEO S W.Subscription-period-aware key management for secure vehicular multicast communications[J].IEEE Transactions on Vehicular Technology,2013,62(9):4213-4227.
[7]JIANG R B,ZHU Y M,WANG X,et al.TMC:Exploiting trajectories for multicast in sparse vehicular networks[J].IEEE Transactions on Parallel and Distributed Systems,2015,26(1):262-271.
[8]CHALLAL Y,SEBA H.Group key management protocols:a novel taxonomy[J].International Journal of Information Technology,2005,2(1):105-118.
[9]WONG C K,GOUDA M,LAM S S.Secure group communications using key graphs[J].IEEE/ACMTransactions on Networking,2000,8(1):16-30.
[10]SUN Y,TRAPPE W,LIU K J.Topology-aware key management schemes for wireless multicast[C]//IEEEGlobal Telecommunications Conference,2003:1471-1475.
[11]SUN Y,TRAPPE W,LIU K J R.A scalable multicast key management scheme for heterogeneous wireless networks[J].IEEE/ACM Transactions on Networking(TON),2004,12(4):653-666.
[12]ZHU H J,LU R X,SHEN X M,et al.Security in service-oriented vehicular networks[J].IEEE Wireless Communications,2009,16(4):16-22.
[13]陈丽,李治军,姜守旭.车联网中传输调度与资源分配相结合的内容下载[J].软件学报,2014,25(10):2362-2372.
[14]VIJAYAKUMAR P,BOSE S,KANNAN A.Chinese remainder theorem based centralized group key management for secure multicast communication[J].Information Security,2014,8(3):179-187.
[15]LI X J,WANG L M.A rapid certification protocol from bilinear pairings for vehicular Ad hoc networks[C]//IEEE11th International Conference on Trust,Security and Privacy in Computing and Communications,2012:890-895.
[16]MEJRI M N,BEN-OTHMAN J,HAMDI M.Survey on VANET security challenges and possible cryptographic solutions[J].Vehicular Communications,2014,1(2):53-66.
[17]LIU Y L,WANG L M,CHEN H H.Message authentication using proxy vehicles in vehicular ad hoc networks[J].IEEE Transactions on Vehicular Technology,2015,64(8):3697-3710.