TY - GEN
T1 - Secure Group Key Dissemination Protocol in Cooperative Vehicular Platooning
AU - Braiteh, Farah Emma
AU - Bassi, Francesca
AU - Khatoun, Rida
N1 - Publisher Copyright:
© 2025 IEEE.
PY - 2025/1/1
Y1 - 2025/1/1
N2 - Cooperative vehicular platoons improve road safety and reduce congestion through synchronized maneuvers enabled by Vehicle-to-Vehicle (V2V) communication. Vehicles are authenticated using certificates from the Cooperative Intelligent Transport Systems (C-ITS) Public Key Infrastructure (PKI). Short-term certificates, serving as vehicle identifiers, change over time and distance, which may lead to legitimate members being misidentified as attackers in the platoon, resulting in false positives. Additionally, sensitive data, such as platoon IDs, must be protected from impersonation attacks by external vehicles. To address these challenges, we propose a secure group key-based authentication framework that uses post-quantum cryptography and Shamir's Secret Sharing for key exchange. This ensures accurate member authentication and protection of platoon data. Security analysis using the Scyther tool along with simulations using PLEXE simulator demonstrate the protocol's effectiveness in securing platoon operations against cyber threats.
AB - Cooperative vehicular platoons improve road safety and reduce congestion through synchronized maneuvers enabled by Vehicle-to-Vehicle (V2V) communication. Vehicles are authenticated using certificates from the Cooperative Intelligent Transport Systems (C-ITS) Public Key Infrastructure (PKI). Short-term certificates, serving as vehicle identifiers, change over time and distance, which may lead to legitimate members being misidentified as attackers in the platoon, resulting in false positives. Additionally, sensitive data, such as platoon IDs, must be protected from impersonation attacks by external vehicles. To address these challenges, we propose a secure group key-based authentication framework that uses post-quantum cryptography and Shamir's Secret Sharing for key exchange. This ensures accurate member authentication and protection of platoon data. Security analysis using the Scyther tool along with simulations using PLEXE simulator demonstrate the protocol's effectiveness in securing platoon operations against cyber threats.
KW - CAV Platooning
KW - Group Key Sharing
KW - Module-Lattice-Based Key-Encapsulation Mechanism
KW - Shamir Secret Key Sharing
KW - V2V
UR - https://www.scopus.com/pages/publications/105029909286
U2 - 10.1109/WiMob66857.2025.11257457
DO - 10.1109/WiMob66857.2025.11257457
M3 - Conference contribution
AN - SCOPUS:105029909286
T3 - International Conference on Wireless and Mobile Computing, Networking and Communications
BT - 2025 21st International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2025
PB - IEEE Computer Society
T2 - 21st International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2025
Y2 - 20 October 2025 through 22 October 2025
ER -