Unified security architecture and protocols using third party identity in V2V and V2I networks

  • Authors:
  • Jaeduck Choi;Souhwan Jung

  • Affiliations:
  • The Attached Institute of ETRI, Daejeon 305-600, Korea;School of Electronic Engineering, Soongsil University, Seoul 156-743, Korea

  • Venue:
  • Wireless Communications & Mobile Computing
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

VANETs have been developed to improve the safety and efficiency of transportation systems (V2V communications) and to enable various mobile services for the traveling public (V2I communications). For VANET technologies to be widely available, security issues concerning several essential requirements should be addressed. The existing security architectures and mechanisms have been studied separately in V2V and V2I networks, which results in duplicated efforts, security modules, and more complex security architectures. In this paper, we propose a unified security architecture and its corresponding security protocols that achieve essential security requirements such as authentication, conditional privacy, non-repudiation, and confidentiality. To the best of our knowledge, this paper is the first study that deals with the security protocol in V2V as well as the handover authentication in V2I communications. Our proposal is characterized by a low-complexity security framework, owing to the design and unification of the security architectures and modules. Furthermore, the evaluation of the proposed protocols proves them to be more secure and efficient than existing schemes. Copyright © 2010 John Wiley & Sons, Ltd.