没有合适的资源?快使用搜索试试~ 我知道了~
资源详情
资源评论
资源推荐
2327-4662 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2740569, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL 1
Blockchain-Based Dynamic Key Management for
Heterogeneous Intelligent Transportation Systems
Ao Lei, Haitham Cruickshank, Member, IEEE, Yue Cao, Member, IEEE,
Philip Asuquo, Chibueze P. Anyigor Ogah, and Zhili Sun, Member, IEEE
Abstract—As modern vehicle and communication technolo-
gies advanced apace, people begin to believe that Intelligent
Transportation System (ITS) would be achievable in one decade.
ITS introduces information technology to the transportation
infrastructures and aims to improve road safety and traffic
efficiency. However, security is still a main concern in Vehicular
Communication Systems (VCS). This can be addressed through
secured group broadcast. Therefore, secure key management
schemes are considered as a critical technique for network
security. In this paper, we propose a framework for providing
secure key management within the heterogeneous network. The
security managers (SMs) play a key role in the framework by
capturing the vehicle departure information, encapsulating block
to transport keys and then executing rekeying to vehicles within
the same security domain. The first part of this framework is
a novel network topology based on a decentralised blockchain
structure. The blockchain concept is proposed to simplify the
distributed key management in heterogeneous VCS domains.
The second part of the framework uses the dynamic transaction
collection period to further reduce the key transfer time during
vehicles handover. Extensive simulations and analysis show the
effectiveness and efficiency of the proposed framework, in which
the blockchain structure performs better in term of key transfer
time than the structure with a central manager, while the dynamic
scheme allows SMs to flexibly fit various traffic levels.
Index Terms—Dynamic Key Management, Blockchain, han-
dover, VCS, ITS
I. INTRODUCTION
C
YBER-PHYSICAL System (CPS) is considered as one
of the most potential techniques to bring a better life
to human beings. One of the most attractive CPS scenarios
is the Intelligent Transportation Systems (ITS). Vehicles and
ITS infrastructures play the role of physical units, while
the Vehicular Communication Systems (VCS) is the network
platform of ITS. VCS supports not only message exchange
among vehicles, but also between vehicles and infrastructures
as well. Infrastructure access points in VCS are called Road
Side Units (RSUs) [1]. RSUs act as a base station in VCS
and covers a dedicated section of the road. Traditional VCS is
comprised of multiple RSU cells and offers a platform among
ITS for vehicles to exchange various kinds of messages such
A. Lei, H. Cruickshank, P. Asuquo, C. P. Anyigorogah and Z. Sun
are with the Institute of Communication Systems, University of Sur-
rey, GU2 7XH, UK (email: a.lei@surrey.ac.uk; h.cruickshank@surrey.ac.uk;
p.asuquo@surrey.ac.uk; c.anyigorogah@surrey.ac.uk; z.sun@surrey.ac.uk).
Y. Cao is with the Department of Computer and Information Sci-
ences, Northumbria University, Newcastle-upon-Tyne, NE1 8ST, UK (email:
yue.cao@northumbria.ac.uk).
Copyright (c) 2012 IEEE. Personal use of this material is permitted.
However, permission to use this material for any other purposes must be
obtained from the IEEE by sending a request to pubs-permissions@ieee.org.
as safety notification message. With the help of VCS, ITS
can offer safer and efficient traffic management. Moreover,
commercial applications, such as electric vehicle charging [2],
image recognition for license plates, location based service
information and dynamic scene to assist vehicle navigation [3],
can be implemented on a dedicated platform. A recent report
from U.S Department of Transport (DoT) shows that 82% of
the accidents can be prevented by using ITS systems [4]. Even
though significant developments have taken place over the
past few years in the area of VCS, security issues, especially
key management schemes are still an open topic for research
[5] [6]. High mobility, large volume, frequent handoffs of
vehicular nodes and heterogeneity networks pose different
challenges compared to the traditional mobile networks.
VCS applications are classified into Vehicle-to-Vehicle
(V2V) and Vehicle-to-Infrastructure (V2I) [7] and its security
highly relies on the exchange of safety beacon messages.
These beacon messages are usually referred to as Cooperative
Awareness Messages (CAMs) in Europe [8] or Basic Safety
Messages (BSMs) for US [9], as they enable other vehicles to
be aware of their surroundings. Vehicles located in the same
RSU cell form a group and the current traffic situation is
generated based on the summary of BSM broadcast from other
group members [10]. The trustfulness and legality of BSM
information are proved by encrypting safety messages with
a pre-agreed Group Key (GK). For this reason, the problem
of providing ITS security can be mapped into the problem
of how to reliably distribute or update group keys among
all the communicating participants. Several approaches were
developed to improve the efficiency of managing keys for
groups. Key Tree Approaches [11] [12] were developed to ease
the problem. Furthermore, Batch Rekeying (BR) [13] [14] [15]
was proposed to significantly improve efficiency compared to
individual rekeying schemes. But these approaches are not
suitable for VCS application as the number of mobile nodes
may be very large in VCS.
Aside from the aforementioned problem, it is critical to
make sure the cryptographic materials can be timely delivered
to the Security Manager (SM) in a new security domain.
Moreover, GK has to be refreshed and redistributed (rekeying)
securely whenever group member changes in order to achieve
forward and backward secrecy [16]. This approach poses chal-
lenges of rekeying efficiency, especially in the heterogeneous
network. Heterogeneity in wireless network refers to either the
difference on the traffic volumes, or distinct network structures
[17]. The heterogeneous networks structures normally stand
for the networks managed under different topologies or central
2327-4662 (c) 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2740569, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL 2
managers [18] [19]. Recently, heterogeneous VCSs are given
more attention. The heterogeneity in terms of different central
managers has become a real problem as VCS is considered as
a worldwide system covering multiple countries. Specifically
speaking, SM should timely deliver a vehicle’s cryptographic
materials to the neighbour SM when the car passes the cross-
domain border.
With this in mind, blockchain [20] is considered as a feasi-
ble tool to achieve the goal. Blockchain is a synchronised and
distributed ledger which stores a list of blocks. Blocks record
user information and a receipt to link to the previous block.
Central managers are removed from the blockchain structure
and the public ledger is maintained by all the network partic-
ipants instead. Messages are broadcasted into the network for
nodes to authenticate. A new block is attached to the ledger
if the messages pass the authentication process. With the help
with this simplified structure, information propagation between
security domains can be accelerated since the information is
directly sent to the destination rather than passing the messages
through central managers. Moreover, the distributed structure
of blockchain network performs better robustness under the
single point of failure.
In this paper, we propose a key management scheme
for VCS scenario, including the key transfer between two
heterogeneous networks and the dynamic key management
scheme to decrease the key transfer time. A novel blockchain
concept is introduced into the proposed scheme to simplify the
key transfer handshake procedure in order to achieve better
efficiency. In the blockchain based scheme, we removed the
third-party authorities (central managers) and the key transfer
processes are verified and authenticated by the SM network.
The record of these processes (mined blocks) is shared within
the network for SMs to create public ledgers. Furthermore, the
transaction collection period is able to dynamically change
with respect to various traffic levels. The time consumption
result of heterogeneous key management is compared with
that in the traditional network structure to evaluate the perfor-
mances of our blockchain based scheme.
The remainder of this paper is organised as follows: Sec-
tion II briefly introduces key management techniques. Model
overview and details of our scheme are discussed in section
III. We describe our system model, including blockchain
algorithms, key transfer between heterogeneous networks and
dynamic transaction collection periods. Scenario is set up for
performance evaluation in Section IV. Section V concludes
the paper and presents some future plans.
II. RELATED WORK
In this section, we present the overview of the characteristics
of any related schemes in this section, a brief literature review
about CPS, bitcoin, blockchain applications and VCS key
management is introduced afterwards.
A. Cyber-Physical System
In Cyber-Physical System, components are classified into
physical part and software part [21]. Physical components
include infrastructures, network sensors and computation de-
vices. Software components contain programme, software op-
eration systems and the IoT environment. CPS has various
use cases, including ITS, smart grid, smart meters, smart
medical systems, smart cities, etc. These use cases assist
living, improve safety and release traffic jam. However, chal-
lenges hide in the positive impact of CPS. Major challenges
about CPS have been conducted in enhancing the security
and privacy, as well as network efficiency [22] [23]. For
instance, wireless sensor network is a well known CPS use
case. It requires security scheme to maintain both efficient
secret key distribution and low energy consumption [24]. A
cutting-edge CPS scenario is described in paper [25]. The
paper proposes a solution in vehicular fog-computing services
(vehicular CPS). The fog-computing follows the distribution
structure and distributes the heavy computation tasks to the
infrastructures, instead of central manager. Paper [25] enables
a smart resource management to optimise the communication-
plus-computing energy efficiency in order to achieve the best
QoS requirement. A more applicable fog-computing-based
CPS system is discussed in [26]. The paper developed a
framework to optimise TCP/IP virtualised data centres, the dy-
namic scheduler and the dynamic queue system are taken into
consideration. The dynamic approach not only maximise the
average workload admitted by the data centre, but also min-
imise the resulting network-plus-computing average energy
consumption. However, both the above schemes only cover
the network efficiency issue, but not consider the security and
privacy vulnerabilities.
B. Blockchain and Security Analysis
A lot of attention has been attracted to the blockchain
concept since its parent production, bitcoin, was launched
in late 2008 [20]. The core idea of blockchain is that it
maintains a distributed, authenticated and synchronised ledger
of transactions. Without the administration from the central
manager, network nodes denote their processing power to
proofread transactions. The authenticated transactions are writ-
ten into the public ledger in the form of blocks. Accountability
function is benefited by using block look-up, which helps to
timely revoke the cryptographic materials of malicious users.
Another issue of blockchain approach is the use of transactions
which conveys information among the distributed network
and can hence send messages using peer-to-peer mode [27].
More importantly, network participants (miners) contribute
their processing power to verify information correctness and
integrity in blockchain network [27].
Two characteristics are always mentioned along with
blockchain: distributed and decentralised. The distributed char-
acteristic means that the network structure follows mesh or
P2P topologies. Decentralisation mainly refers to the manage-
ment mode of blockchain network. However the core principle
in blockchain is decentralisation. The centralised network de-
pends on a network manager to prevent malicious behaviours.
As a result, centralised managers take too much communica-
tion and computation burden. Furthermore, the whole network
suffers from disconnection if the central manager is under
剩余11页未读,继续阅读
白绍伟
- 粉丝: 18
- 资源: 287
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 国际象棋检测9-YOLO(v5至v11)、COCO、CreateML、Paligemma、TFRecord、VOC数据集合集.rar
- 2024年秋学季-C#课程的信息系统大作业winform
- 基于Spring Boot+Vue技术的湖南特产销售网站(编号:17755125).zip
- 基于Spring Boot的企业客源关系管理系统的设计与实现(编号:1778968).zip
- 基于spring boot的实验室开放管理系统_4ty8i0c9_203-wx.zip
- 基于Spring Boot的养老院管理系统的设计与实现_6575f5w2_223-wx(1).zip
- 基于Spring Boot的中药材管理系统(编号:25853136).zip
- 基于Spring Boot框架的网上蛋糕销售系统_30z8r428_231-wx.zip
- ZZU 面向对象Java实验报告
- 用python ollama qwen2.5 开发一个AI修仙游戏 MUD
- 基于Spring Cloud技术的智慧云停车场服务管理系统(编号:28065246).zip
- 基于spring mvc和mybatis的食品商城系统(编号:9025459).zip
- NET综合解决工具,windows平台必备
- 基于Spark的电影推荐系统源码(毕设)
- 明厨亮灶老鼠检测数据集:用于YOLO模型训练的高质量数据集
- 商城蛋糕数据库sql源码
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论0