Secure Public Key Regime (SPKR) in vehicular networks
Title | Secure Public Key Regime (SPKR) in vehicular networks |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Chuan, T. H., Zhang, J., Maode, M., Chong, P. H. Joo, Labiod, H. |
Conference Name | 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) |
Date Published | aug |
Keywords | authentication, certificate revocation list, certificate-less PKI, collusion attack, Collusion Attacks, complex certificate verification process, Computer crime, delegated trusted authorities, denial of service attack, Denial of Service attacks, digital signatures, lower authentication delay, mobile radio, preauthentication mechanism, pubcrawl170109, Public key, public key cryptography, road side units, Schnorr signature, secure public key regime, Vehicles, Vehicular Networks |
Abstract | Public Key Regime (PKR) was proposed as an alternative to certificate based PKI in securing Vehicular Networks (VNs). It eliminates the need for vehicles to append their certificate for verification because the Road Side Units (RSUs) serve as Delegated Trusted Authorities (DTAs) to issue up-to-date public keys to vehicles for communications. If a vehicle's private/public key needs to be revoked, the root TA performs real time updates and disseminates the changes to these RSUs in the network. Therefore, PKR does not need to maintain a huge Certificate Revocation List (CRL), avoids complex certificate verification process and minimizes the high latency. However, the PKR scheme is vulnerable to Denial of Service (DoS) and collusion attacks. In this paper, we study these attacks and propose a pre-authentication mechanism to secure the PKR scheme. Our new scheme is called the Secure Public Key Regime (SPKR). It is based on the Schnorr signature scheme that requires vehicles to expend some amount of CPU resources before RSUs issue the requested public keys to them. This helps to alleviate the risk of DoS attacks. Furthermore, our scheme is secure against collusion attacks. Through numerical analysis, we show that SPKR has a lower authentication delay compared with the Elliptic Curve Digital Signature (ECDSA) scheme and other ECDSA based counterparts. |
URL | https://ieeexplore.ieee.org/document/7245678 |
DOI | 10.1109/SSIC.2015.7245678 |
Citation Key | chuan_secure_2015 |
- lower authentication delay
- vehicular networks
- vehicles
- secure public key regime
- Schnorr signature
- road side units
- public key cryptography
- Public key
- pubcrawl170109
- preauthentication mechanism
- mobile radio
- authentication
- digital signatures
- Denial of Service attacks
- denial of service attack
- delegated trusted authorities
- Computer crime
- complex certificate verification process
- Collusion Attacks
- collusion attack
- certificate-less PKI
- certificate revocation list