An Efficient Authentication Protocol for GPS Information Exchange between Cars Using the Base Station

기지국을 이용한 차량간 GPS 정보 교환을 위한 효율적인 인증 프로토콜

  • Received : 2010.01.29
  • Accepted : 2010.08.17
  • Published : 2010.09.30

Abstract

Inter-vehicle communication is one of the most important parts in Intelligent Vehicle System. Through this communication, drivers can recognize what is happening out of their sights, such as the freezing condition of the street, traffic accidents, and so on. Each car in IVS gives various services to the drivers after analyzing those received information from cars or a base station. If the message is, however, exchanged from car to car directly, the computation cost which is needed for all the car to authenticate the transmitted message between nearby cars is tremendously high. Therefore, one can naturally think that the message communication between cars is performed with the help of the base station to reduce the computation cost. In this case where the base station collects all the information transmitted from cars and broadcasts them nearby, there should be an efficient way both for the base station to authenticate the car message within its communication range and for the car to authenticate the information received from the base station. In this paper, we present a two-way authentication protocol using a hash chain to efficiently exchange GPS information between a car and a base station. This information can be used to provide a driver with the navigation which displays all the moving cars around him in real time. When a car goes into an area of a base station, the car authenticates itself to the base station using its private key of PKI, sends a commitment of a hash chain, then starts to send a message with the hash value for authentication. The message includes GPS information, driver's status and so on. The base station also authenticates itself to the nearby cars using its private key, transmits the commitment of the hash chain, and sends all the messages gathered from cars with authentication information.

Keywords

References

  1. M. Jakobsson, "Fractal hash sequence representation and traversaI", ISIT, 2002.
  2. M.Jakobsson, "Almost optimal hash sequence traversal", FC'02. LNCS, 2002.
  3. D. H. Yum, J. W. Seo, S. Eom, and P. J. Lee, "Single-layer fractal hash chain traversal with almost optimal complexity", CT-RSA, 2009.
  4. T. Leinmuller, L.Buttyan, J. Hubaux, F. Kargl, R. Kroh, P. Papadimitratos, M. Raya, and E Schoch, "SEVECOM - Secure vehicle communication", IST Mobile and Wireless Communication Summit, 2006.
  5. G. Calandriello, P. Papadimitratos, J. Hubaux, and A. Lioy, "Efficient robust pseudonymous authentication in VANET". ACM International workshop on Vehicular ad hoc networks, 2007.
  6. A. Studer, F. Bai, B. B and A. Perrig, "Flexible, extensible, and efficient VANET authentication". ESCAR, 2008.
  7. J Hubaux, S. Capkun, and J. L. Epfl, "The Security and privacy of smart vehicles", IEEE Computer Society, 2004
  8. A. Perrig, R. Canetti, D. Song, and D.Tγgar, "The TESLA broadcast authentication protocol", RSA Seucirty, 2002.
  9. http://www.cryptopp.com/benchmarks.html
  10. Michael Lee O'Connor "Carrier-phase differential GPS for automatic control of land Vehicles", Doctor Thesis, 1997.
  11. "GALILEO, misstion high level definition", European Commission ESA, Sep, 2002
  12. 장재득, 박형준, "3G LTE 이동통신 시스템 단말 플랫폼 기술 동향과 전망", 전자통신동향분석, 2월, 2008.