This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Group Key Management for Secure Multicasting in Remote Software Upload to Future Vehicles
Technical Paper
2006-01-1584
ISSN: 0148-7191, e-ISSN: 2688-3627
Annotation ability available
Sector:
Language:
English
Abstract
In future, updating various software modules in vehicles on a regular basis will be required for various reasons such as update functionalities in the existing system, add new functionalities, remove software bugs, update navigation map etc. For updating software to a large number of vehicles, remote updating using mobile multicasting would be the most efficient and economic than unicast updating in service station. However, the security requirement of multicast communication, i.e., confidentiality and integrity of the information transmitted and authenticity of the group members, is challenging. In this paper, we investigate issues in designing key management architectures for secure multicast network, particularly for remote software update in future vehicles. Vehicular software distribution network is considered as wireless network where vehicles are connected to the software distributors through base stations. Since the network consists of vehicles and base stations, the network dynamics is characterized by quasi-permanent mobility, high speed and frequent hand-off. High mobility and frequent hand-off increase the complexity of dynamic group membership which results in increase complexity in key generation and distribution. However, unlike the other mobile hosts such as PDA, vehicles provide sufficient battery, computational power and memory which allow performing complex cryptographic algorithm. Taking these things into consideration, we propose to use decentralized key management technique to generate and distribute multicast session key to the group members. Consequently, we evaluate our proposed architecture based on key distribution efficiency, re-keying efficiency, computational complexity, key storage requirement and scalability. From our analysis, it is found that the set-up and re-keying time of the proposed mechanism is in the range of few milliseconds while it provides confidentiality, authenticity and data integrity.
Citation
Hossain, I. and Mahmud, S., "Group Key Management for Secure Multicasting in Remote Software Upload to Future Vehicles," SAE Technical Paper 2006-01-1584, 2006, https://doi.org/10.4271/2006-01-1584.Also In
SAE 2006 Transactions Journal of Passenger Cars: Electronic and Electrical Systems
Number: V115-7; Published: 2007-03-30
Number: V115-7; Published: 2007-03-30
References
- Mahmud S. M. Shanker S. Hossain I. “Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links,” Proc. IEEE Intelligent Vehicles Symposium June 6-8 2005 Las Vegas, Nevada, USA 587 592
- Sahasrabuddhe L. H. Mukherjee B. “Multicast routing algorithms and protocols: A tutorial,” IEEE Network January February 2000 90 102
- Varshney U. “Multicast over wireless networks,” Communication of the ACM 45 12 31 37 December 2002
- Bruschi D. Rosti E. “Secure multicast networks of mobile hosts: protocols and issues,” Mobile Networks and Applications 7 503 511 2002
- Wallner D. M. Harder E. J. Agee R. C. “Key management for multicast: Issues and architectures,” RFC 2627 June 1999
- Miucic R. Mahmud S. M. “Wireless multicasting for remote software upload in vehicles with realistic vehicle movement,” Proc. SAE World Congress April 11-14 2005
- Hossain I. Mahmud S. M. “Secure Multicast Protocol for Remote Software Upload in Intelligent Vehicles,” Proc. of the 5 th Ann. Intel. Vehicle Systems Symp. of National Defense Industries Association (NDIA) National Automotive Center and Vectronics Technology June 13 -16 2005 Traverse City, Michigan 145 155
- Rafaeli S. Hutchison D. “A survey of key management for secure group communication,” ACM Computing Surveys September 2003 35 3 309 329
- Sun Y. Trappe W. Liu K.J. Ray “A scalable multicast key management scheme for heterogeneous wireless networks,” IEEE ACM Transactions on Networking 12 4 653 666 2004
- Harney H. Muckenhirn C. “Group Key Management Protocol (GKMP) architecture,” July 1997 RFC 2093
- Harney H. Muckenhirn C. “Group Key Management Protocol (GKMP) architecture,” July 1997 RFC 2093
- Harney H. Muckenhirn C. “Group Key Management Protocol (GKMP) specification,” July 1997 RFC 2094
- Mittra S. “Iolus: A framework for scalable secure multicasting,” Proc. ACM SIGCOMM'97 27 4 277 288
- Hardjono T. Cain B. Monga I. “Intra-domain Group key management protocol,” Internet Draft November 1998
- Seita S. Koussih S. Jajodia S. “Kronos: A scalable group re-keying approach for secure multicast,” Proc. IEEE Symposium on security and privacy IEEE Computer Society Press LosAlamotis, CA
- Challal Y. Bettahar H. Bouabdallah A. “SAKM: A scalable and adaptive key management approach for multicast communications,” ACM SIGMOCOM Computer Communication Review 34 2 55 70
- Munaka T. Ito Y. Kubota S. “A study of info-communication technologies required in the ITS network,” Symposium of Application and Internet Workshop (saint-w) 171 2001
- Paul S. Multicast on the Internet and Its Applications Boston, MA Kluwer 1998
- IEEE Standard for Local and Metropolitan Area Network Part16: Air Interface for Fixed Broadband Wireless Access Systems October 1 2004 http://standards.ieee.org/getieee802/download/802.16-2004.pdf
- Fixed, Nomadic, Portable and Mobile Applications for 802.16-2004 and 802.16e WiMAX Networks WiMAX Forum November 2005
- Visoottiviseth V. “Sender-Initiated Multicast for small group communications,” Nara Institute of Science and Technology JAPAN Feb 2003
- Federal Information processing Standards Publication Data Encryption Standards (DES) December 1993 FIPS PUB 46
- Federal Information processing Standards Publication Advanc Encryption Standards (AES) November 2001 FIPS PUB 197
- Rivest R. “The MD5 Message-Digest algorithm,” RFC 1321 April 1992