Policy management for secure data access control in vehicular networks

Dijiang Huang, Wei Tek Tsai, Yi Hsin Tseng

Research output: Contribution to journalArticlepeer-review

1 Scopus citations


The state-of-the-art research in vehicular network security does not address the need for low latency message access control in vehicular applications with tight connection time and message delay requirements. In existing security solutions, the major limitation is that no trust establishment mechanisms that adapt to rapidly changing scenarios and highly mobile environments (mainly because of key management delay, processing overhead, and changing communication peers). To address this issue, we present a policy management framework for secure data access control in vehicular networks. Our solution address two interrelated research areas to achieve efficiency and scalability for data access control and policy management in highly dynamic vehicular networks. The main contributions are in two-fold: (a) efficient key management and group-based policy enforcement using attribute-based cryptography; and (b) dynamic security policy management framework and methodology to manage credentials based on role, time, location and other situation dependent attributes. Our solution utilizes efficient attribute-based cryptography algorithm to achieve unprecedented speedups in message processing time to meet the real-time requirement. To demonstrate the effectiveness of our proposed solution, a systematic and comprehensive evaluation is produced to valid our proposed solution.

Original languageEnglish (US)
Pages (from-to)448-471
Number of pages24
JournalJournal of Network and Systems Management
Issue number4
StatePublished - Dec 1 2011


  • Data access control
  • Security policy management
  • Vehicular networks

ASJC Scopus subject areas

  • Information Systems
  • Hardware and Architecture
  • Computer Networks and Communications
  • Strategy and Management


Dive into the research topics of 'Policy management for secure data access control in vehicular networks'. Together they form a unique fingerprint.

Cite this