Loading…

A novel key management protocol for vehicular cloud security

The protocol works in following steps: 1) CA generates individual unique key pair for each registered vehicle. 2) Secure and reliable key distribution protocol, based on Public Key Infrastructure (PKI) and digital certificates is used by CA. 3) Keys are securely stored at CA repository using key wra...

Full description

Saved in:
Bibliographic Details
Published in:Telkomnika 2019-04, Vol.17 (2), p.857-865
Main Authors: Hegde, Nayana, Manvi, Sunilkumar S.
Format: Article
Language:English
Subjects:
Citations: Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The protocol works in following steps: 1) CA generates individual unique key pair for each registered vehicle. 2) Secure and reliable key distribution protocol, based on Public Key Infrastructure (PKI) and digital certificates is used by CA. 3) Keys are securely stored at CA repository using key wrapping constructors/hash functions. 4) CA utilizes global revocation approach based on PKI Certificate Revocation List (CRL) to delete keys and certificates from compromised vehicles. Assumptions The following assumptions are made in deployment of the proposed protocol: a. All vehicles are equipped with wireless communication devices, Global Positioning System (GPS), digital maps and optional sensors for reporting vehicle conditions. b. CA is trusted by all entities involved in VCC, has powerful firewalls and is not compromised. c. Every RSU deployed on the road or highway has a unique id (RSU|D) and is registered to a CA. d. VCC users approach physically to CA, provide all essential data like vehicle id, name, phone number, email id, unique identity number and get registered with CA. e. OBU, RSU and CA communicate to each other via high bandwidth, low bit error and low delay links [13, 24, 25]. f. Data messages are encrypted at OBU before uploading it to vehicular cloud. Each entry consists of the serial number of a certificate and revocation date for that certificate. Because serial numbers are unique within CA, the serial number is sufficient to identify the certificate. Key storage is very simple and easy in the proposed scheme because they are encrypted with block ciphers and stored at CA secure data base. [...]only N (number of users) keys will not have multiple storage complexity in proposed method.
ISSN:1693-6930
2302-9293
DOI:10.12928/telkomnika.v17i2.9278