{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:05:37Z","timestamp":1775228737117,"version":"3.50.1"},"reference-count":39,"publisher":"MDPI AG","issue":"21","license":[{"start":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T00:00:00Z","timestamp":1603843200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Safety applications based on vehicle-to-everything (V2X) communications can significantly enhance road safety and reduce traffic fatalities. Ensuring the security and privacy of the vehicular network is essential for the widespread adoption of V2X communications for commercial use. V2X safety and service applications require periodic broadcast communications among all the vehicles. However, compared to unicast communication, it is extremely challenging to provide broadcast communication with network security requirements such as confidentiality, in infotainment contents distribution, sensor data sharing, and security credentials management services. To address the providing confidentiality of vehicle-to-vehicle (V2V) broadcasting, we propose a group key management and message encryption method that is secure, lightweight, and scalable. The proposed group key management method can efficiently handle various scenarios like a node joining or leaving the group, with scalable rekeying algorithms. It employs a distributed and scalable architecture that offers several advantages such as the reduction of the key management overhead and the enhancement of the security level by keeping the key sizes with large networks. In addition, the proposed method employs a lightweight matrix-based encryption algorithm that can be easily applicable with the proposed group key management method. Further, we have implemented the proposed method and evaluated the performance using a V2V network simulator with several networks of highly dynamic group members. The simulation results show that the proposed method can reduce computation time for group key generation and message encryption by more than 80% compared to existing methods.<\/jats:p>","DOI":"10.3390\/s20216137","type":"journal-article","created":{"date-parts":[[2020,10,29]],"date-time":"2020-10-29T21:21:00Z","timestamp":1604006460000},"page":"6137","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["A Scalable and Secure Group Key Management Method for Secure V2V Communication"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7213-7848","authenticated-orcid":false,"given":"Hayotjon","family":"Aliev","sequence":"first","affiliation":[{"name":"Department of Electronics Engineering, Chungbuk National University, Cheongju 28644, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2602-2075","authenticated-orcid":false,"given":"HyungWon","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Electronics Engineering, Chungbuk National University, Cheongju 28644, Korea"}]},{"given":"Sunghyun","family":"Choi","sequence":"additional","affiliation":[{"name":"Samsung Research, Samsung Electronics, Seoul 06765, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2020,10,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1109\/TITS.2018.2818888","article-title":"A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy","volume":"20","author":"Lu","year":"2018","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Li, C., Ji, S., Zhang, X., Wang, H., Li, D., and Liu, H. (2018). An Effective and Secure Key Management Protocol for Message Delivery in Autonomous Vehicular Clouds. Sensors, 18.","DOI":"10.3390\/s18092896"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"2740","DOI":"10.1109\/TITS.2017.2657649","article-title":"Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm","volume":"18","author":"Liu","year":"2017","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"153","DOI":"10.4304\/jcp.9.1.153-160","article-title":"ECDH-based Scalable Distributed Key Management Scheme for Secure Group Communication","volume":"9","author":"Niu","year":"2014","journal-title":"J. Comput."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Yadav, M., Singh, K., and Pandey, A.S. (2016, January 11\u201313). Key management in efficient and secure group communication. Proceedings of the 2016 International Conference on Emerging Trends in Electrical Electronics & Sustainable Energy Systems (ICETEESES), Sultanpur, India.","DOI":"10.1109\/ICETEESES.2016.7581384"},{"key":"ref_6","first-page":"53","article-title":"Survey on VANET security challenges and possible cryptographic solutions","volume":"1","author":"Mejri","year":"2014","journal-title":"Veh. Commun."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2014.02.020","article-title":"VANET security surveys","volume":"44","author":"Engoulou","year":"2014","journal-title":"Comput. Commun."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"5642","DOI":"10.1109\/TVT.2015.2487832","article-title":"Fast and Secure Group Key Dissemination Scheme for Out-of-Range V2I Communication","volume":"64","author":"Park","year":"2015","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Lin, H.Y., Hsieh, M.-Y., and Li, K.-C. (2018, January 26\u201329). The Secure Vehicle-to-Vehicle and Vehicle-to-Group Communication Mechanisms in Smart City. Proceedings of the 2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService), Bamberg, Germany.","DOI":"10.1109\/BigDataService.2018.00035"},{"key":"ref_10","first-page":"107","article-title":"A Survey on Security and Key Management in VANET","volume":"3","author":"Vasukidevi","year":"2017","journal-title":"Int. J. Innov. Res. Sci. Technol."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Zheng, X., Huang, C.-T., and Matthews, M. (2007, January 23\u201324). Chinese remainder theorem based group key management. Proceedings of the 45th Annual Southeast Regional Conference, Winston-Salem, NC, USA.","DOI":"10.1145\/1233341.1233389"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"967","DOI":"10.1080\/02533839.2009.9671584","article-title":"Key tree and Chinese remainder theorem based group key distrubution scheme","volume":"32","author":"Zhou","year":"2009","journal-title":"J. Chin. Inst. Eng."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1015","DOI":"10.1109\/TITS.2015.2492981","article-title":"Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks","volume":"17","author":"Vijayakumar","year":"2015","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Liu, L., Wang, Y., Zhang, J., and Yang, Q. (2019). A Secure and Efficient Group Key Agreement Scheme for VANET. Sensors, 19.","DOI":"10.3390\/s19030482"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Menesidou, S.A., Katos, V., and Kambourakis, G. (2017). Cryptographic Key Management in Delay Tolerant Networks: A Survey. Future Internet, 9.","DOI":"10.3390\/fi9030026"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1526","DOI":"10.1016\/j.adhoc.2009.04.011","article-title":"ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks","volume":"7","author":"Huang","year":"2009","journal-title":"Ad Hoc Netw."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"682","DOI":"10.1016\/j.sigpro.2014.11.012","article-title":"An efficient message access quality model in vehicular communication networks","volume":"120","author":"Liu","year":"2016","journal-title":"Signal Process."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"2803","DOI":"10.1186\/s13638-016-0687-0","article-title":"A secure billing protocol over attribute-based encryption in vehicular cloud computing","volume":"2016","author":"Nkenyereye","year":"2016","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2629","DOI":"10.1109\/TITS.2017.2653103","article-title":"Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks","volume":"18","author":"Xia","year":"2017","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"40420","DOI":"10.1109\/ACCESS.2018.2858233","article-title":"Efficient and Secure Access Control Scheme in the Standard Model for Vehicular Cloud Computing","volume":"6","author":"Luo","year":"2018","journal-title":"IEEE Access"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Huang, Q., Yang, Y., and Shi, Y. (2018). SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing. Sensors, 18.","DOI":"10.3390\/s18020666"},{"key":"ref_22","unstructured":"IEEE 1609 WG (2017). IEEE Standard for Wireless Access in Vehicular Environments (WAVE)\u2014Security Services for Applications and Management Messages, IEEE. IEEE Std 1609.2a-2017."},{"key":"ref_23","unstructured":"IEEE 1609 WG (2019). IEEE Standard for Wireless Access in Vehicular Environments (WAVE)\u2014Security Services for Applications and Management Messages. Amendment 2: PDU Functional Types and Encryption Key Management, IEEE. IEEE Std 1609.2b-2019."},{"key":"ref_24","unstructured":"Aliev, H., and Kim, H.W. (2018, January 22). Group key generation and distribution algorithm design for V2X wireless communication. Proceedings of the Winter Conference KICS, Gangwon-do, Korea."},{"key":"ref_25","unstructured":"National Institute of Standards and Technology (2012). Recommendation for Key Management, Part 1: General, (revised), NIST. NIST Special Publication 800-57."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., Buchmann, J., and Dahmen, E. (2009). Post-Quantum Cryptography, Springer.","DOI":"10.1007\/978-3-540-88702-7"},{"key":"ref_27","first-page":"1","article-title":"LCPPA: Lattice-based conditional privacy preserving authentication in vehicular communication","volume":"31","author":"Dharminder","year":"2019","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1109\/JSAC.2011.110109","article-title":"A Region-Based Clustering Mechanism for Channel Access in Vehicular Ad Hoc Networks","volume":"29","author":"Lai","year":"2010","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_29","first-page":"233","article-title":"A mobility-based scheme for dynamic clustering in vehicular ad-hoc networks (VANETs)","volume":"9","author":"Ren","year":"2017","journal-title":"Veh. Commun."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1517","DOI":"10.1109\/TITS.2018.2853165","article-title":"New Multi-Hop Clustering Algorithm for Vehicular Ad Hoc Networks","volume":"20","author":"Zhang","year":"2018","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1401","DOI":"10.1109\/TITS.2017.2727226","article-title":"A Unified Framework of Clustering Approach in Vehicular Ad Hoc Networks","volume":"19","author":"Ren","year":"2017","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Lonc, B., and Cincilla, P. (2016, January 21\u201324). Cooperative ITS security framework: Standards and implementations progress in Europe. Proceedings of the 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), Coimbra, Portugal.","DOI":"10.1109\/WoWMoM.2016.7523576"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Zhang, C., Lin, X., Lu, R., and Ho, P.-H. (2008, January 19\u201323). RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks. Proceedings of the 2008 IEEE International Conference on Communications, Beijing, China.","DOI":"10.1109\/ICC.2008.281"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1007\/s10207-008-0055-0","article-title":"A survey of certificateless encryption schemes and security models","volume":"7","author":"Dent","year":"2008","journal-title":"Int. J. Inf. Secur."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1316","DOI":"10.1016\/j.jcss.2016.05.006","article-title":"SEMD: Secure and efficient message dissemination with policy enforcement in VANET","volume":"82","author":"Liu","year":"2016","journal-title":"J. Comput. Syst. Sci."},{"key":"ref_36","unstructured":"(2020, September 10). The Pairing-Based Cryptography Library. Available online: http:\/\/crypto.stanford.edu\/pbc."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1195","DOI":"10.1016\/j.jpdc.2012.06.004","article-title":"Group key agreement for secure group communication in dynamic peer systems","volume":"72","author":"Lv","year":"2012","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_38","unstructured":"IEEE 1609 WG (2019). IEEE Guide for Wireless Access in Vehicular Environments (WAVE) Architecture, IEEE. IEEE Std 1609.0-2019."},{"key":"ref_39","first-page":"1691","article-title":"Software Implementation of WAVE Security Algorithms","volume":"15","author":"Kang","year":"2014","journal-title":"J. Korea Acad. Coop. Soc."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/21\/6137\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:30:07Z","timestamp":1760178607000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/21\/6137"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,28]]},"references-count":39,"journal-issue":{"issue":"21","published-online":{"date-parts":[[2020,11]]}},"alternative-id":["s20216137"],"URL":"https:\/\/doi.org\/10.3390\/s20216137","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,28]]}}}