Evaluation of a zone encryption scheme for vehicular networks

Abstract Vehicular communications are bringing a new wave of applications under the umbrella of the Cooperative Intelligent Transportation Systems (C-ITS). To this end, on-board units are expected to send messages periodically or upon the appearance of a relevant event, to feed an awareness ecosystem that enables safety or traffic efficiency services. This is the case of Cooperative Awareness Messages (CAMs) in Europe, which contain basic vehicle information such as its position or speed, among other parameters. From a network security perspective, CAMs are broadcasted unencrypted over an unprotected radio channel, hence enabling their potential interception and the disclosure of sensitive data. Although public key infrastructures (PKI)-like solutions have been proposed, high computational cost of asymmetric cryptography to cipher application data remains a challenge and a confidentiality alternative is needed. In this work, we present the implementation and evaluation of a symmetric encryption scheme based on disjoint security domains distributed in geographical areas. In the solution, vehicles are able to coordinate and agree on common keys to be used in different security zones. Simulation results show the validity of the zone encryption scheme in diverse vehicular scenarios with different traffic densities. A potential issue in the zone key redistribution consisting in the propagation of wrongly-generated duplicated keys is also detected, which is discussed in detail and a reliable solution based on the support of third-party data-forwarders is proposed and tested. Evaluations reveal good performance of the zone encryption mechanism in terms of robustness and latency, guaranteeing the efficient access to a secured channel while maintaining low computing load.

[1]  Joel J. P. C. Rodrigues,et al.  An intelligent approach for building a secure decentralized public key infrastructure in VANET , 2015, J. Comput. Syst. Sci..

[2]  Guozhu Liu,et al.  A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs , 2017, Sensors.

[3]  Chin-Ling Chen,et al.  A Secure Ambulance Communication Protocol for VANET , 2013, Wirel. Pers. Commun..

[4]  Benayad Nsiri,et al.  An Adaptive Key Exchange Procedure for VANET , 2016 .

[5]  Sherali Zeadally,et al.  5G for Vehicular Communications , 2018, IEEE Communications Magazine.

[6]  G. Dimitrakopoulos,et al.  Intelligent Transportation Systems , 2010, IEEE Vehicular Technology Magazine.

[7]  Nsw Roads and Maritime Services Intelligent Transport Systems (ITS) , 2016 .

[8]  Jonathan Katz,et al.  Symmetric-Key Broadcast Encryption: The Multi-sender Case , 2017, CSCML.

[9]  Pedro J. Fernández,et al.  Securing Vehicular IPv6 Communications , 2016, IEEE Transactions on Dependable and Secure Computing.

[10]  Nabil Hmina,et al.  xxTEA-VCLOUD: A Security Scheme for the Vehicular Cloud Network using a Lightweight Encryption Algorithm , 2018 .

[11]  Debasis Das,et al.  Secure message transmission algorithm for Vehicle to Vehicle (V2V) communication , 2016, 2016 IEEE Region 10 Conference (TENCON).

[12]  Xuejiao Liu,et al.  SEMD: Secure and efficient message dissemination with policy enforcement in VANET , 2016, Journal of computer and system sciences (Print).

[13]  Dong-Yuan Shi,et al.  An anonymous data access scheme for VANET using pseudonym-based cryptography , 2016, J. Ambient Intell. Humaniz. Comput..

[14]  Anja Lehmann,et al.  Zone Encryption with Anonymous Authentication for V2V Communication , 2020, 2020 IEEE European Symposium on Security and Privacy (EuroS&P).

[15]  Narendra S. Chaudhari,et al.  SRCPR: SignReCrypting Proxy Re-Signature in Secure VANET Groups , 2018, IEEE Access.

[16]  Yong-Hwan Lee,et al.  Secure and privacy-aware traffic information as a service in VANET-based clouds , 2015, Pervasive Mob. Comput..

[17]  Dong-Yuan Shi,et al.  Pseudonym-Based Cryptography and Its Application in Vehicular Ad Hoc Networks , 2014, 2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications.

[18]  Xinyang Deng,et al.  A location privacy protection scheme based on random encryption period for VSNs , 2020, J. Ambient Intell. Humaniz. Comput..

[19]  Junggab Son,et al.  TIaaS: Secure Cloud-assisted Traffic Information Dissemination in Vehicular Ad Hoc Networks , 2013, 2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing.

[20]  Arun Malik,et al.  Asymmetric encryption based secure and efficient data gathering technique in VANET , 2017, 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence.

[21]  Qing Yang,et al.  A Secure and Efficient Group Key Agreement Scheme for VANET , 2019, Sensors.