Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems

As modern vehicle and communication technologies advanced apace, people begin to believe that the Intelligent Transportation System (ITS) would be achievable in one decade. ITS introduces information technology to the transportation infrastructures and aims to improve road safety and traffic efficiency. However, security is still a main concern in vehicular communication systems (VCSs). This can be addressed through secured group broadcast. Therefore, secure key management schemes are considered as a critical technique for network security. In this paper, we propose a framework for providing secure key management within the heterogeneous network. The security managers (SMs) play a key role in the framework by capturing the vehicle departure information, encapsulating block to transport keys and then executing rekeying to vehicles within the same security domain. The first part of this framework is a novel network topology based on a decentralized blockchain structure. The blockchain concept is proposed to simplify the distributed key management in heterogeneous VCS domains. The second part of the framework uses the dynamic transaction collection period to further reduce the key transfer time during vehicles handover. Extensive simulations and analysis show the effectiveness and efficiency of the proposed framework, in which the blockchain structure performs better in term of key transfer time than the structure with a central manager, while the dynamic scheme allows SMs to flexibly fit various traffic levels.

[1]  Haitham S. Cruickshank,et al.  Scalable balanced batch rekeying for secure group communication , 2006, Comput. Secur..

[2]  Mohsen Guizani,et al.  Handover authentication for mobile networks: security and efficiency aspects , 2015, IEEE Network.

[3]  Zhili Sun,et al.  A Secure Key Management Scheme for Heterogeneous Secure Vehicular Communication Systems , 2016 .

[4]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.

[5]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 1998, SIGCOMM '98.

[6]  Mohsen Guizani,et al.  A framework for a distributed key management scheme in heterogeneous wireless sensor networks , 2008, IEEE Trans. Wirel. Commun..

[7]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.

[8]  Bingpeng Zhou,et al.  On the Spatial Error Propagation Characteristics of Cooperative Localization in Wireless Networks , 2017, IEEE Transactions on Vehicular Technology.

[9]  Yue Cao,et al.  An Electric Vehicle Charging Management Scheme Based on Publish/Subscribe Communication Framework , 2016, IEEE Systems Journal.

[10]  Christian Decker,et al.  Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.

[11]  Enzo Baccarelli,et al.  Q*: Energy and delay-efficient dynamic queue management in TCP/IP virtualized data centers , 2017, Comput. Commun..

[12]  Wei Yu,et al.  Towards experimental evaluation of intelligent Transportation System safety and traffic efficiency , 2015, 2015 IEEE International Conference on Communications (ICC).

[13]  Houbing Song,et al.  ICMDS: Secure inter-cluster multiple-key distribution scheme for wireless sensor networks , 2017, Ad Hoc Networks.

[14]  K. J. Ray Liu,et al.  A scalable multicast key management scheme for heterogeneous wireless networks , 2004, IEEE/ACM Transactions on Networking.

[15]  Enzo Baccarelli,et al.  Energy-Efficient Adaptive Resource Management for Real-Time Vehicular Cloud Services , 2019, IEEE Transactions on Cloud Computing.

[16]  Ning Wang,et al.  Software Defined Networking With Pseudonym Systems for Secure Vehicular Clouds , 2016, IEEE Access.

[17]  Xiaozhou Li,et al.  Batch rekeying for secure group communications , 2001, WWW '01.

[18]  A. Varga,et al.  THE OMNET++ DISCRETE EVENT SIMULATION SYSTEM , 2003 .

[19]  Huanling Wang,et al.  Local Stereo Matching Based on Support Weight With Motion Flow for Dynamic Scene , 2016, IEEE Access.

[20]  Eric Harder,et al.  Logical Key Hierarchy Protocol , 1999 .

[21]  Hannes Hartenstein,et al.  A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.

[22]  Andrew Lippman,et al.  MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).

[23]  Reinhard German,et al.  Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis , 2011, IEEE Transactions on Mobile Computing.

[24]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[25]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[26]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[27]  Qiong Huang,et al.  User-Defined Privacy Grid System for Continuous Location-Based Services , 2015, IEEE Transactions on Mobile Computing.

[28]  John B. Kenney,et al.  Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.

[29]  Edward A. Lee Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).

[30]  Insup Lee,et al.  Cyber-physical systems: The next computing revolution , 2010, Design Automation Conference.

[31]  Andreas M. Antonopoulos,et al.  Mastering Bitcoin: Unlocking Digital Crypto-Currencies , 2014 .

[32]  Haitham S. Cruickshank,et al.  Geographic-Based Spray-and-Relay (GSaR): An Efficient Routing Scheme for DTNs , 2015, IEEE Transactions on Vehicular Technology.

[33]  Davor Svetinovic,et al.  Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams , 2018, IEEE Transactions on Dependable and Secure Computing.

[34]  Jiafu Wan,et al.  A survey of Cyber-Physical Systems , 2011, 2011 International Conference on Wireless Communications and Signal Processing (WCSP).

[35]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[36]  Chun Chen,et al.  Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions , 2012, IEEE Transactions on Wireless Communications.

[37]  Luca Veltri,et al.  A novel batch-based group key management protocol applied to the Internet of Things , 2013, Ad Hoc Networks.

[38]  Omar Zakaria,et al.  An efficient scalable batch-rekeying scheme for secure multicast communication using multiple logical key trees , 2014 .

[39]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[40]  George Danezis,et al.  Centrally Banked Cryptocurrencies , 2015, NDSS.