WEKO3
アイテム
Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs
https://ipsj.ixsq.nii.ac.jp/records/83942
https://ipsj.ixsq.nii.ac.jp/records/839425a9b8459-aa10-4d30-9f48-9ae476bb7b8d
| 名前 / ファイル | ライセンス | アクション |
|---|---|---|
|
|
Copyright (c) 2012 by the Information Processing Society of Japan
|
|
| オープンアクセス | ||
| Item type | Journal(1) | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 公開日 | 2012-09-15 | |||||||||||
| タイトル | ||||||||||||
| タイトル | Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs | |||||||||||
| タイトル | ||||||||||||
| 言語 | en | |||||||||||
| タイトル | Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs | |||||||||||
| 言語 | ||||||||||||
| 言語 | eng | |||||||||||
| キーワード | ||||||||||||
| 主題Scheme | Other | |||||||||||
| 主題 | [特集:スマートな社会を実現するコンピュータセキュリティ技術] Elliptic curve ElGamal Threshold Cryptosystem, key management scheme, Distributed RSU, VANET | |||||||||||
| 資源タイプ | ||||||||||||
| 資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||||||
| 資源タイプ | journal article | |||||||||||
| 著者所属 | ||||||||||||
| Department of Informatics, Kyushu University | ||||||||||||
| 著者所属 | ||||||||||||
| Department of Informatics, Kyushu University | ||||||||||||
| 著者所属 | ||||||||||||
| Department of Informatics, Kyushu University | ||||||||||||
| 著者所属(英) | ||||||||||||
| en | ||||||||||||
| Department of Informatics, Kyushu University | ||||||||||||
| 著者所属(英) | ||||||||||||
| en | ||||||||||||
| Department of Informatics, Kyushu University | ||||||||||||
| 著者所属(英) | ||||||||||||
| en | ||||||||||||
| Department of Informatics, Kyushu University | ||||||||||||
| 著者名 |
Na, Ruan
× Na, Ruan
× Takashi, Nishide
× Yoshiaki, Hori
|
|||||||||||
| 著者名(英) |
Na, Ruan
× Na, Ruan
× Takashi, Nishide
× Yoshiaki, Hori
|
|||||||||||
| 論文抄録 | ||||||||||||
| 内容記述タイプ | Other | |||||||||||
| 内容記述 | In Vehicular Ad Hoc Networks (VANETs), the vehicular scenario requires smart signaling, smart road maintenance and other services. A brand new security issue is that the semi-trusted Road Side Units (RSUs) may be compromised. In this paper, we propose an Elliptic curve ElGamal Threshold system-based key management scheme for safeguarding a VANET from RSUs being compromised and their collusion with malicious vehicles. We analyze the packet loss tolerance for security performance demonstration, followed by a discussion on the threshold. After discussion of the feasibility on privacy and processing time, overhead analysis is presented in terms of two types of application scenarios: Emergency Braking Notification (EBN) and Decentralized Floating Car Data (DFCD). Our method can promote security with low overhead in EBN and does not increase overhead in DFCD during security promotion. ------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.20(2012) No.4 (online) DOI http://dx.doi.org/10.2197/ipsjjip.20.846 ------------------------------ |
|||||||||||
| 論文抄録(英) | ||||||||||||
| 内容記述タイプ | Other | |||||||||||
| 内容記述 | In Vehicular Ad Hoc Networks (VANETs), the vehicular scenario requires smart signaling, smart road maintenance and other services. A brand new security issue is that the semi-trusted Road Side Units (RSUs) may be compromised. In this paper, we propose an Elliptic curve ElGamal Threshold system-based key management scheme for safeguarding a VANET from RSUs being compromised and their collusion with malicious vehicles. We analyze the packet loss tolerance for security performance demonstration, followed by a discussion on the threshold. After discussion of the feasibility on privacy and processing time, overhead analysis is presented in terms of two types of application scenarios: Emergency Braking Notification (EBN) and Decentralized Floating Car Data (DFCD). Our method can promote security with low overhead in EBN and does not increase overhead in DFCD during security promotion. ------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.20(2012) No.4 (online) DOI http://dx.doi.org/10.2197/ipsjjip.20.846 ------------------------------ |
|||||||||||
| 書誌レコードID | ||||||||||||
| 収録物識別子タイプ | NCID | |||||||||||
| 収録物識別子 | AN00116647 | |||||||||||
| 書誌情報 |
情報処理学会論文誌 巻 53, 号 9, 発行日 2012-09-15 |
|||||||||||
| ISSN | ||||||||||||
| 収録物識別子タイプ | ISSN | |||||||||||
| 収録物識別子 | 1882-7764 | |||||||||||