CPL - Chalmers Publication Library
| Utbildning | Forskning | Styrkeområden | Om Chalmers | In English In English Ej inloggad.

Low-Cost Key Management for Hierarchical Wireless Vehicle Networks

Dennis K. Nilsson (Institutionen för data- och informationsteknik, Datorteknik (Chalmers)) ; Ulf Larson (Institutionen för data- och informationsteknik, Datorteknik (Chalmers)) ; Erland Jonsson (Institutionen för data- och informationsteknik, Datorteknik (Chalmers))
Proceedings of the IEEE Intelligent Vehicles Symposium, June 4-6, 2008, Eindhoven, The Netherlands (2008)
[Konferensbidrag, refereegranskat]

We have analyzed a hypothetical scenario for hierarchical wireless vehicle networks consisting of a central portal and a large number of vehicles. Vehicles join the network, establish connections to the portal, transfer data, and then leave the network. An efficient approach to provide authentication between a vehicle and the portal is to use the same preestablished symmetric link key for multiple occasions instead of performing a rigorous key agreement for every new occasion. However, since the same key is used for extended periods of time, the risk of cryptanalysis and offline bruteforcing of the link key increases. Therefore, there is a need to establish new keys between the portal and the vehicles (rekeying) in a secure and efficient manner. Moreover, to provide authenticity of the portal, the portal has a public and private key pair, and the public key is preinstalled in the vehicles. To reduce the risk of cryptanalysis of the private key of the portal, the public and private key pair of the portal must also be rekeyed. In this paper, we propose low-cost key management protocols for rekeying of the link keys and the public/private key pair of the portal.

Nyckelord: Wireless vehicle networks, key management, rekeying



Denna post skapades 2008-06-06.
CPL Pubid: 71463

 

Institutioner (Chalmers)

Institutionen för data- och informationsteknik, Datorteknik (Chalmers)

Ämnesområden

Datorteknik

Chalmers infrastruktur

Relaterade publikationer

Denna publikation ingår i:


How to Secure the Connected Car