Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

DECENT: Decentralized and Efficient Key Management to Secure Communication in Dense and Dynamic Environments

Published: 01 July 2023 Publication History

Abstract

Intelligent Transportation Systems (ITS), one aspect of the Smart City paradigm, aim to improve the efficiency, convenience, and safety of travelers. The integration of (vehicular) communication technologies allows communication between the on-board communication units (OBUs) of vehicles, roadside units (RSUs), and vulnerable road users (VRUs), and contribute to the efficacy of ITS applications. However, these additional sources of information must be reliable and accurate. Security primitives such as confidentiality, integrity, and authenticity are required, but only achievable when supported with a suitable cryptographic key management scheme. This paper presents the design of a decentralized and efficient key management scheme, abbreviated as the DECENT scheme. This scheme provides secure multi-hop communication in dense and dynamic network environments while functioning in a self-organized manner. Through threshold secret sharing techniques, network nodes act as a distributed trusted third party (TTP) such that a threshold number of nodes can collaborate to execute key management functions. These functions include decentralized node admission and key updating. Novelties include (i) the unique self-healing characteristic, meaning that DECENT is capable of independently recovering from network compromise, and (ii) guidelines for choosing an appropriate security threshold in any deployment scenario which maximizes the level of security while simultaneously guaranteeing that decentralized key management services can be provided.

References

[1]
A. Laouiti, A. Qayyum, and M. N. M. Saad, “Vehicular ad-hoc networks for smart cities,” in Advances in Intelligent Systems and Computing, vol. 548. Singapore: Springer, 2017.
[2]
V. Sucasas, G. Mantas, F. B. Saghezchi, A. Radwan, and J. Rodriguez, “An autonomous privacy-preserving authentication scheme for intelligent transportation systems,” Comput. Secur., vol. 60, pp. 193–205, Jul. 2016.
[3]
B. Ji, Y. Li, D. Cao, C. Li, S. Mumtaz, and D. Wang, “Secrecy performance analysis of UAV assisted relay transmission for cognitive network with energy harvesting,” IEEE Trans. Veh. Technol., vol. 69, no. 7, pp. 7404–7415, Jul. 2020.
[4]
W. Duan, J. Gu, M. Wen, G. Zhang, Y. Ji, and S. Mumtaz, “Emerging technologies for 5G-IoV networks: Applications, trends and opportunities,” IEEE Netw., vol. 34, no. 5, pp. 283–289, Sep. 2020.
[5]
A. Munir and F. Koushanfar, “Design and analysis of secure and dependable automotive CPS: A steer-by-wire case study,” IEEE Trans. Dependable Secure Comput., vol. 17, no. 4, pp. 813–827, Jul. 2020.
[6]
S. Goudarzi, N. Kama, M. H. Anisi, S. Zeadally, and S. Mumtaz, “Data collection using unmanned aerial vehicles for Internet of Things platforms,” Comput. Elect. Eng., vol. 75, pp. 1–15, May 2019.
[7]
J. Rodriguezet al., “Secure virtual mobile small cells: A stepping stone toward 6G,” IEEE Commun. Standards Mag., vol. 5, no. 2, pp. 28–36, Jun. 2021.
[8]
M. Ree, G. Mantas, A. Radwan, S. Mumtaz, J. Rodriguez, and I. Otung, “Key management for beyond 5G mobile small cells: A survey,” IEEE Access, vol. 7, pp. 59200–59236, 2019.
[9]
A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, Nov. 1979.
[10]
J. Liet al., “Decentralized on-demand energy supply for blockchain in Internet of Things: A microgrids approach,” IEEE Trans. Computat. Social Syst., vol. 6, no. 6, pp. 1395–1406, Dec. 2019.
[11]
H. Luo and S. Lu, “Ubiquitous and robust authentication services for ad hoc wireless networks,” Univ. California, Los Angeles, CA, USA, Tech. Rep. UCLA-CSD-TR-200030, 2000.
[12]
H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, “URSA: Ubiquitous and robust access control for mobile ad hoc networks,” IEEE/ACM Trans. Netw., vol. 12, no. 6, pp. 1049–1063, Dec. 2004.
[13]
P. Feldman, “A practical scheme for non-interactive verifiable secret sharing,” in Proc. 28th Annu. Symp. Found. Comput. Sci. (SFCS), Los Angeles, CA, USA, Oct. 1987, pp. 427–437.
[14]
S. Jarecki, “Proactive secret sharing public key cryptosystems,” M.S. thesis, Dept. Elect. Eng. Comput. Sci., Massachusetts Inst. Technol., Cambridge, MA, USA, 1995.
[15]
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, “Proactive secret sharing or: How to cope with perpetual leakage,” in Proc. CRYPTO, Santa Barbara, CA, USA, 1995, pp. 339–352.
[16]
H. Deng and D. P. Agrawal, “TIDS: Threshold and identity-based security scheme for wireless ad hoc networks,” Ad Hoc Netw., vol. 2, no. 3, pp. 291–307, Jul. 2004.
[17]
E. da Silva and L. C. P. Albini, “Towards a fully self-organized identity-based key management system for MANETs,” in Proc. IEEE 9th Int. Conf. Wireless Mobile Comput., Netw. Commun. (WiMob), Lyon, France, Oct. 2013, pp. 717–723.
[18]
Z. Zhang, W. Susilo, and R. Raad, “Mobile ad-hoc network key management with certificateless cryptography,” in Proc. 2nd Int. Conf. Signal Process. Commun. Syst., Gold Coast, QLD, Australia, Dec. 2008, pp. 1–10.
[19]
F. Li, M. Shirase, and T. Takagi, “Key management using certificateless public key cryptography in ad hoc networks,” in Proc. 5th IFIP Int. Conf. Netw. Parallel Comput. (NPC), Shanghai, China, 2008, pp. 116–126.
[20]
J. Lai, W. Kou, and K. Chen, “Self-generated-certificate public key encryption without pairing and its application,” Inf. Sci., vol. 181, no. 11, pp. 2422–2435, Jun. 2011.
[21]
M. Gharib, Z. Moradlou, M. A. Doostari, and A. Movaghar, “Fully distributed ECC-based key management for mobile ad hoc networks,” Comput. Netw., vol. 113, pp. 269–283, Feb. 2017.
[22]
M. de Ree, G. Mantas, J. Rodriguez, I. E. Otung, and C. Verikoukis, “DISTANT: DIStributed trusted authority-based key managemeNT for beyond 5G wireless mobile small cells,” Comput. Commun., vol. 176, pp. 218–233, Aug. 2021.
[23]
N. Saxena, G. Tsudik, and J. H. Yi, “Efficient node admission and certificateless secure communication in short-lived MANETs,” IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 2, pp. 158–170, Feb. 2009.
[24]
N. Saxena, “Public key cryptography sans certificates in ad hoc networks,” in Proc. 4th Int. Conf. Appl. Cryptogr. Netw. Secur. (ACNS), Singapore, 2006, pp. 375–389.
[25]
R. Ostrovsky and M. Yung, “How to withstand mobile virus attacks,” in Proc. 10th Annu. ACM Symp. Princ. Distrib. Comput. (PODC), Montreal, QC, Canada, 1991, pp. 51–59.
[26]
M. Girault, “Self-certified public keys,” in Proc. EUROCRYPT, Brighton, U.K., 1991, pp. 490–497.
[27]
R. Blom, “An optimal class of symmetric key generation systems,” in Proc. EUROCRYPT, Paris, France, 1984, pp. 335–338.
[28]
A. J. Menezes, P. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, 5th ed. Boca Raton, FL, USA: CRC Press, 2001.
[29]
N. Saxena, G. Tsudik, and J. Hyun Yi, “Efficient node admission for short-lived mobile ad hoc networks,” in Proc. 13th IEEE Int. Conf. Netw. Protocols (ICNP), Boston, MA, USA, Nov. 2005, pp. 269–278.
[30]
D. Poole, Linear Algebra: A Modern Introduction, 2nd ed. Ottawa, ON, Canada: Thomson Brooks/Cole, 2006.
[31]
M. Narasimha, G. Tsudik, and J. Hyun Yi, “On the utility of distributed cryptography in P2P and MANETs: The case of membership control,” in Proc. 11th IEEE Int. Conf. Netw. Protocols, Atlanta, GA, USA, Nov. 2003, pp. 336–345.
[32]
S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography,” in Proc. ASIACRYPT, Taipei, Taiwan, 2003, pp. 452–473.
[33]
M. de Ree. (2022). DECENT Simulation. GitHub. [Online]. Available: https://github.com/mderee/Public-Scripts/blob/main/DECENT-sim

Cited By

View all
  • (2024)Considerations for Decision Makers and Developers Toward the Adoption of Decentralized Key Management Systems Technology in Emerging ApplicationsComputer10.1109/MC.2023.333939057:7(27-38)Online publication date: 1-Jul-2024
  • (2023)A lightweight hierarchical key management approach for internet of thingsJournal of Information Security and Applications10.1016/j.jisa.2023.10348575:COnline publication date: 26-Jul-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Transactions on Intelligent Transportation Systems
IEEE Transactions on Intelligent Transportation Systems  Volume 24, Issue 7
July 2023
1120 pages

Publisher

IEEE Press

Publication History

Published: 01 July 2023

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Considerations for Decision Makers and Developers Toward the Adoption of Decentralized Key Management Systems Technology in Emerging ApplicationsComputer10.1109/MC.2023.333939057:7(27-38)Online publication date: 1-Jul-2024
  • (2023)A lightweight hierarchical key management approach for internet of thingsJournal of Information Security and Applications10.1016/j.jisa.2023.10348575:COnline publication date: 26-Jul-2023

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media