My Account Log in

1 option

Group Key Management for Secure Multicasting in Remote Software Upload to Future Vehicles Wayne State University

SAE Technical Papers (1906-current) Available online

View online
Format:
Conference/Event
Author/Creator:
Hossain, Irina, author.
Conference Name:
SAE 2006 World Congress & Exhibition (2006-04-03 : Detroit, Michigan, United States)
Language:
English
Physical Description:
1 online resource
Place of Publication:
Warrendale, PA SAE International 2006
Summary:
In future, updating various software modules in vehicles on a regular basis will be required for various reasons such as update functionalities in the existing system, add new functionalities, remove software bugs, update navigation map et cetera For updating software to a large number of vehicles, remote updating using mobile multicasting would be the most efficient and economic than unicast updating in service station. However, the security requirement of multicast communication, id est, confidentiality and integrity of the information transmitted and authenticity of the group members, is challenging. In this paper, we investigate issues in designing key management architectures for secure multicast network, particularly for remote software update in future vehicles. Vehicular software distribution network is considered as wireless network where vehicles are connected to the software distributors through base stations. Since the network consists of vehicles and base stations, the network dynamics is characterized by quasi-permanent mobility, high speed and frequent hand-off. High mobility and frequent hand-off increase the complexity of dynamic group membership which results in increase complexity in key generation and distribution. However, unlike the other mobile hosts such as PDA, vehicles provide sufficient battery, computational power and memory which allow performing complex cryptographic algorithm. Taking these things into consideration, we propose to use decentralized key management technique to generate and distribute multicast session key to the group members. Consequently, we evaluate our proposed architecture based on key distribution efficiency, re-keying efficiency, computational complexity, key storage requirement and scalability. From our analysis, it is found that the set-up and re-keying time of the proposed mechanism is in the range of few milliseconds while it provides confidentiality, authenticity and data integrity
Notes:
Vendor supplied data
Publisher Number:
2006-01-1584
Access Restriction:
Restricted for use by site license

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account