Abstract
With the rapid development of vehicular ad hoc networks (VANETs), security issues are concerned. Among various security measures, secure group key agreement for VANETs attracts more and more attention. Researchers have studied generic group key agreement schemes for a long while; however, most of them are not designed for VANETs. Considering energy-constrained and fast moving features in vehicular ad hoc network, we propose a new location-based distributed group key agreement LDGKA scheme for VANETs. We adopt a hybrid approach in which members in the vehicular ad hoc network form various logic groups in the same region. Within each group, virtual key tree model is employed so that the rekeying operation can be efficiently carried out when members leave or join. It only requires to rebuild
1. Introduction
A vehicular ad hoc network can be regarded as logic groups where the group members are the nodes in the network. Since such a network can be formed in an ad hoc manner, we need an efficient scheme to set up a group key to allow the group members to communicate secretly. For example, if a group of vehicles within a small region decide to share information or chat, they can form a small group network and establish a group key for secure group communication. Others outside the group cannot understand the contents of their discussion even if they can capture every single message of the discussion. Vehicular ad hoc network has the characteristics such that members can freely join in and leave the group; so group key management is a major issue and has been a fundamental block in the scheme. Moreover, the devices in a VANET are usually energy constrained and the bandwidth in the network is commonly limited, so a feasible scheme for VANETs must be of low computation with as fewer communication rounds as possible.
In order to solve these problems, we propose a new scheme of location-based distributed group key agreement for VANETs. In our scheme, no third parties or trusted central authority is required. All members in the network are equal. In the scheme we adopt a tree structure to reduce the computation when any rekeying operation is performed. In addition, this scheme can achieve the goal that given a group, any subset of members can form a private subgroup for secure communication. Moreover, members are able to form a new temporary session group if they are initially located in different regions. Besides, it does not require any central entity which could be a single point of failure or may cause the performance bottleneck. The scheme only requires two communication rounds for keys distribution and rekeying operation.
The rest of the paper is organized as follows. Section 2 introduces the related works. The new scheme is described in Section 3. And the performance issues and security characteristics are discussed in Section 4. Finally, we conclude the paper in Section 5.
2. Related Works
Some group key management techniques [1–4] had been proposed which are applied for various group communications in the early time. Lately, with the development of mobile ad hoc networks and wireless sensor networks, researchers found that traditional group key management schemes cannot be directly applied for the mobile ad hoc networks because of the energy-constrained feature in mobile ad hoc networks. Therefore, some group key management schemes customized for mobile ad hoc network have been proposed successively. Kim et al. [5] firstly propose a tree-based Diffie-Hellman group key agreement (TGDH) for mobile ad hoc networks, which starts to research on how to save the energy when members agree on keys. Later on, researchers proposed several group key agreement schemes that mainly focus on reducing the communication and computation of processing key agreement [6–16].
With the research development on VANETs, the problem of the group key management for VANETs started to be concerning. Yeh et al. [17] proposed a group key management framework based on certificate authority (CA) in VANETs. Since CA and asymmetric cryptography were employed in the scheme, it requires a central control point and the cost is still high for vehicular ad hoc networks. Hao et al. [18] proposed a group key management by corporation messages between nodes; Don applied multivariate symmetric polynomial algorithm to group key agreement for VANETs, while most proposed group key management schemes for VANETs are from the aspects of security algorithms. Considering the special features of VANETs such as fast moving characteristic, that old members leave or new nodes join, we need to rethink the group key management protocols for VANETs.
3. Location-Based Distributed Group Key Agreement (LDGKA)
3.1. Assumptions
In the scheme, we assume that vehicular nodes can be classified in different logical groups according to their location distribution, and virtual binary key trees are built among the members in each group initially. Members belonging to the same logical group are close to each other in physical location. Each member has an unforgeable pair of public and private keys and a certificate of the public key, and subsets of nodes share the internal keys. Leaf keys are members' public keys; each member contains the key tree data. The nodes whose positions are most left are selected as the supernodes in the groups; if any supernode leaves, the second leftmost sensor becomes the supernode automatically.
3.2. Group Key Initialization and Distribution
According to our observation, we found that the vehicular nodes in the same physical region can probably be neighbors. Hence, we propose a location-based distributed group key agreement scheme, which enables the members in the same physical region to establish group keys. The notations in the rest of the paper can be referenced in (Table 1).
Notations.
Suppose that members
3.3. Rekeying Operations Using One-Way Key Derivation
We employ light-weight one-way key derivation inside the key trees. One-way key derivation means that each node would generate the succession keys by itself while the supernode has no need to distribute fresh keys to those members; thus, it can reduce communication rounds in rekeying process. Since communication to transfer keys inside the group is unnecessary, the communication overhead of rekeying distribution can be decreased.
When groups are initialized, supernodes are responsible for distributing a nonzero salt value
Suppose an outside node joins the network, then it is inserted into the key tree. Moreover, all secondary keys along the path from it to the root should be refreshed. The process of generating these new keys is shown in Figure 1. New secondary key

Rekeying operations when node joins.
When members of a group request to leave, they send request messages with digital signature

Rekeying operations when single user leaves.
3.4. Path Pairwise Key Establishment Protocol
We propose a path pairwise key establishment protocol (Algorithm 1) to establish the session keys between vehicular nodes located in different logic groups. Suppose that Thus,
Algorithm (Path Pairwise Key Establishment Protocol): If ( If (Get public key
Algorithm 1

(a) physical graph and (b) key tree model.
(In our protocol, supernode of each group has the responsibility of forwarding message from its group to its neighbors' groups)
3.5. Cross-Group Key Agreement Protocol
In Algorithm 2, Suppose
Algorithm: (Cross-Group Key Agreement Protocol, If not ( If (Get public keys
Algorithm 2

(a) physical graph and (b) key tree model.
Step 1.
Step 2.
Step 3.
Step 4.
Step 5.
4. Security Analysis
4.1. Group Confidentiality
In secure group communication scheme, any node outside of the group is not expected to be able to decrypt the messages transmitted in group. In our scheme, all the messages in the group are encrypted by the session keys established in the group key agreement process. Because the group keys are real-time created according to instant group communication requirement, outsiders cannot retrieve any group session keys without any insider knowledge. Without the group keys, the adversary cannot decrypt the messages in the group communication. While since the group members are mobile and the group members may change with the time elapsing, the group confidentiality also depends on the secrecy of dynamic group keys that should guarantee the forward secrecy and backward secrecy, which is described as follows.
4.2. Authentication of Joining
All new nodes that request to join one group have to be verified by authentication process. The authentication is executed by verification of digital signature with the public keys of news nodes which is done by supernode. Thus supernode can assure whether the new one is its claiming one.
4.3. Forward Secrecy
When an old node leaves, it cannot be able to get the group key after it leaves, since new nonzero salt value
4.4. Backward Secrecy
A new node is not able to retrieve the current keys used in the group before it joins. That means the new node cannot decrypt the messages transmitted in the group before it joins. Because after any new node joins, the internal keys of the key tree would be refreshed and recomputed by one-way key derivation algorithm. Therefore, after new node joins, it hardly retrieves the former keys used in the group based on current key information. The backward secrecy is ensured.
4.5. Secure keys in the Transmission
Since keys are the crucial data which should be kept safe at all time, we employ self-key derivation and public cryptography approaches. For inside group, the session keys do not need to be transmitted in the group. Thus the eavesdropping on the transmission has no use. For cross-groups, the path keys and cross-group keys are transmitted by encryption of public cryptography. Without private keys, the outsider can hardly get the path keys and cross-group keys.
4.6. Voting Approach to Solve Compromised Nodes
A sensor node inside certain group may be compromised or out of function. When an adversary has compromised certain sensor node(s), he may not launch direct attacks against the group communication immediately since once the misbehavior is detected, the supernode may abandon these compromised nodes. Instead, the adversary may let those compromised nodes behave normally but report false data to others in the group. The purpose of the attacker is to mislead others with falsified data. This kind of attacks may lead to many serious consequences; for instance, a false report for the traffic data may lead to traffic jam or even car accident. Thus, it is an important issue to detect these compromised nodes in spite of such problems.
In our scheme, we propose a voting approach to detect the compromised nodes. Since the compromised nodes probably report false or strange data to others, the sensors inside group can give the proper reputations of their neighbors based on common data patterns by checking validity of the neighbors' talking data. All the voting messages are within other normal group communication messages; thus, it would incur only little extra overhead without increasing extra communications.
As the first step toward the solution to the problem, we model it as a weight-based network. Each node can vote on its neighbor nodes as the value 1 or 0. These votes can be delivered to the supernode. The supernode collects all data (including the votes for each node in the network) provided by sensor nodes and calculates an aggregation result using the votes for each node inside the group as follows (3):
5. Performance Analysis
In this section, we analyze the performance of our protocol based on computation and communication overhead. Because we adopt virtual binary key tree as group model, when new nodes join or old nodes leave, it only needs to rebuild
Let N be the total number of nodes involved and let m be the number of LDGKA groups. We compare our scheme LDGKA with the pure DH group key agreement scheme GDH and popular tree-based DH group key agreement scheme TGDH. We can see that when nodes join, LDGKA only requires one round of communication while TGDH requires two rounds and GDH requires N rounds. When nodes leave, LDGKA does not need any additional communication by using one-way key derivation while GDH requires N rounds of communication and TGDH requires one round of communication. Tables 2, 3, and 4 show the number of communication rounds and the computation for the operations of setup, join, and leave in the three schemes. Table 5 shows the number of keys, that is, the memory to be stored for each scheme. We plot the graph for the communication rounds and computations required by the three protocols for the setup operation with different number of nodes (see Figures 5 and 6).
Comparison of the setup operation.
Comparison of the join operation.
Comparison of the leave operation.
Comparison of average memory.

Communication rounds when setup.

Computation overhead when setup (exps).
From the analysis and comparison of above tables and graphs, we can conclude that LDGKA requires the fewest communication rounds and the least amount of memories to store keys. In the setup operation, LDGKA requires more exponentiations than TGDH; however, in the join or leave operations, LDGKA does not require any exponentiations at all, while the others still require exponentiations to complete the operations. LDGKA adopts one-way functions (hash) to do the key derivation, and computational overhead of hash operations is far less than exponentiations. So we can see for the join or leave operations, LDGKA costs less in computation.
6. Conclusion
We propose a new group key agreement for vehicular ad hoc networks (LDGKA). The proposed protocol handles several critical operations in VANETs such as new nodes joining the group, old nodes leaving the group, and nodes in different regions forming a dynamic group with low computation and communication overhead.
Footnotes
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgments
This research was supported by National Natural Science Foundation of China (no. 61100192) and Research Fund for the Doctoral Program of Higher Education of China (no. 20112302120074), and it was partially supported by Shenzhen Strategic Emerging Industry Development Foundation (no. JCYJ20120613151032592 and no. ZDSY20120613125016389), National Key Technology R&D Program of MOST China under Grant no. 2012BAK17B08, and National Commonweal Technology R&D Program of AQSIQ China under Grant no. 201310087. The authors thank the reviewers for their comments.
