Subscription-Period-Aware Key Management for Secure Vehicular Multicast Communications

As many applications based on wireless communications are being embedded on a vehicular platform, multicast communications have begun to be essential for efficient information delivery. Since multicast communications are vulnerable to unauthorized access, group key management (GKM) is expected to play an essential role as access control. However, we note that the legacy GKM schemes are not cost effective and adequate for use in vehicular environments. This is because the dynamic mobility of a large number of vehicles causes a high frequency of group rekeying, which is used to share a new group key (GK) among the authorized group members for every membership change. To overcome the high frequency of group rekeying, we propose a new GKM scheme, which is called subscription-period-aware key management (SPKM), for cost-effective and secure vehicular multicast group rekeying. As a design problem, we analyze its key management cost, including the communication, computation, and storage costs, for multicast group rekeying, and find an optimal condition to minimize the key management cost. Through simulations under different conditions, we show that the proposed SPKM scheme can greatly reduce the communication, computation, and storage complexity in multicast group rekeying from O(log N) to O(1), where N is the number of vehicles in a single group rekeying process. In addition, we show that the key management cost of the proposed SPKM scheme is lower than those of the well-known GKM schemes for secure vehicular multicast communications.

[1]  Marvin A. Sirbu,et al.  Pricing Multicast Communication: A Cost-Based Approach , 2001, Telecommun. Syst..

[2]  F. Rico-Novella,et al.  Improved LKH for batch rekeying in multicast groups , 2003, International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003..

[3]  Seung-Woo Seo,et al.  Computation-and-storage-efficient key tree management protocol for secure multicast communications , 2010, Comput. Commun..

[4]  Sanjoy Paul,et al.  Multicasting on the Internet and its Applications , 1998, Springer US.

[5]  Kevin C. Almeroth,et al.  Collecting and modeling the join/leave behavior of multicast group members in the MBone , 1996, Proceedings of 5th IEEE International Symposium on High Performance Distributed Computing.

[6]  Francisco Rico-Novella,et al.  Balanced batch LKH: new proposal, implementation and performance evaluation , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[7]  Zongkai Yang,et al.  An efficient batch rekeying scheme based on one-way function tree , 2005, IEEE International Symposium on Communications and Information Technology, 2005. ISCIT 2005..

[8]  Douglas S. Reeves,et al.  Evaluation of multicast routing algorithms for real-time communication on high-speed networks , 1995 .

[9]  Maziar Nekovee,et al.  Sensor networks on the road: the promises and challenges of vehicular ad hoc networks and grids , 2005 .

[10]  Seung-Woo Seo,et al.  Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks , 2010, Wirel. Pers. Commun..

[11]  Seung-Woo Seo,et al.  RSU-Based Distributed Key Management (RDKM) For Secure Vehicular Multicast Communications , 2011, IEEE Journal on Selected Areas in Communications.

[12]  J. Bibb Cain,et al.  Performance and Resource Cost Comparisons for the CBT and PIM Multicast Routing Protocols , 1997, IEEE J. Sel. Areas Commun..

[13]  Dong Young Lee,et al.  Protocol design for scalable and reliable group rekeying , 2001, SPIE ITCom.

[14]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[15]  Azim Eskandarian,et al.  Challenges of intervehicle ad hoc networks , 2004, IEEE Transactions on Intelligent Transportation Systems.

[16]  Seung-Woo Seo,et al.  Optimizing the Batch Mode of Group Rekeying: Lower Bound and New Protocols , 2010, 2010 Proceedings IEEE INFOCOM.

[17]  K. C. Almeroth,et al.  Multicast group behavior in the Internet's multicast backbone (MBone) , 1997 .

[18]  K. J. Ray Liu,et al.  A scalable multicast key management scheme for heterogeneous wireless networks , 2004, IEEE/ACM Transactions on Networking.

[19]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[20]  Andry Rakotonirainy,et al.  Empirical IEEE 802.11p performance evaluation on test tracks , 2012, 2012 IEEE Intelligent Vehicles Symposium.

[21]  Xiaozhou Li,et al.  Batch rekeying for secure group communications , 2001, WWW '01.

[22]  David L. Mills,et al.  Network Time Protocol Version 4: Protocol and Algorithms Specification , 2010, RFC.

[23]  K. J. Ray Liu,et al.  Hierarchical group access control for secure multicast communications , 2007, TNET.