Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007) 2007
DOI: 10.1109/wimob.2007.4390819
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2010
2010
2013
2013

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…From the table, the cost of key calculation of VANET proposed in this study is slightly higher than that of other mechanisms. Nevertheless, this study introduces both symmetrical and asymmetrical key cryptography, whereas other studies only introduce symmetrical key cryptography. Consequently, the process of message transmission proposed in this study triumphs over other studies with better security.…”
Section: Performance Evaluation and Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…From the table, the cost of key calculation of VANET proposed in this study is slightly higher than that of other mechanisms. Nevertheless, this study introduces both symmetrical and asymmetrical key cryptography, whereas other studies only introduce symmetrical key cryptography. Consequently, the process of message transmission proposed in this study triumphs over other studies with better security.…”
Section: Performance Evaluation and Analysismentioning
confidence: 99%
“…In wireless network, there are many studies on secure communication or key management [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18]. However, a wireless network differs from a vehicular network; therefore, the following description will focus on vehicular network by introducing several key management-related studies.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The BSs work as cluster heads and may take part in key management depending on the trust model of the system [6]. Following the similar concept, we proposed two multicast architectures for RSU in vehicle ECUs named as FT and ST systems [4]. In the FT system, the BSs have access to software packets and they take part in key management; whereas, in the ST system the BSs act as proxies for the vehicles by honestly relaying the encrypted software packets from the software distribution centers to the vehicles.…”
Section: A Backgrund and Related Workmentioning
confidence: 99%
“…However, high mobility, frequent handoff, limited and variable bandwidth and higher transmission error of wireless link, strict security requirements in RSU pose different challenges in establishing multicast session in vehicular wireless network. In our previous work [4], we proposed an infrastructure-based wireless multicasting method to update software in vehicle ECUs that uses Base Stations (BSs) or Intelligent Transportation Tower (ITT) of future ITS infrastructure or other third party wireless vendor to distribute the software packets to the targeted vehicles. Consequently, we proposed two multicast Group Key Management (GKM) techniques depending on the trust levels of BSs named Fully-trusted (FT) and Semi-trusted (ST) systems.…”
Section: Introductionmentioning
confidence: 99%