A Security Model for Intelligent Vehicles and Smart Traffic Infrastructure

被引:0
作者
Kumar, Sachin [1 ]
Jha, Sonu [1 ]
Pandey, Sumit Kumar [2 ]
Chattopadhyay, Anupam [1 ]
机构
[1] Nanyang Technol Univ, Singapore, Singapore
[2] Ashoka Univ, Sonipat, India
来源
2018 IEEE INTELLIGENT VEHICLES SYMPOSIUM (IV) | 2018年
基金
新加坡国家研究基金会;
关键词
User Authentication Protocol; Key-Agreement; Public-Key Cryptography; Cyber Security; Intelligent Vehicles; Authenticated Key Exchange;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intelligent vehicles require to communicate with other vehicles as well as with the road-side infrastructure for gathering information such as traffic management, cooperative driving, telematics and road construction. However, vehicle-to-vehicle (V2V) and vehicle to infrastructure (V2I) communications can impose some serious security threats against vehicles' safety and other sensitive information which can lead to catastrophic consequences. Therefore, there is a pressing need to develop appropriate security protocols facilitating V2I and V2V communication. This paper presents a model for smart traffic infrastructure consisting of numerous entities like smart sensors, intelligent vehicles, base stations along with a new user authentication and key-exchange protocol which aids in the establishment of a secure session for communication between the entities. In the proposed protocol, any SUF-CMA (Strong Unforgeable- Chosen Message Attack) secure digital signature algorithm can be used for authenticating the users and any NM-CCA2 (Non-Malleability Chosen Ciphertext Attack) secure algorithm can also be used for the challenge response phase between the users authenticating themselves.
引用
收藏
页码:162 / 167
页数:6
相关论文
共 13 条
  • [1] Bécsi T, 2015, 2015 INTERNATIONAL CONFERENCE ON MODELS AND TECHNOLOGIES FOR INTELLIGENT TRANSPORTATION SYSTEMS (MT-ITS), P477, DOI 10.1109/MTITS.2015.7223297
  • [2] An Authentication Protocol for Future Sensor Networks
    Bilal, Muhammad
    Kang, Shin-Gak
    [J]. SENSORS, 2017, 17 (05):
  • [3] Wireless Communication and Security Issues for Cyber-Physical Systems and the Internet-of-Things
    Burg, Andreas
    Chattopadhyay, Anupam
    Lam, Kwok-Yan
    [J]. PROCEEDINGS OF THE IEEE, 2018, 106 (01) : 38 - 60
  • [4] Canniere C. D., 2008, SPRINGER VERLAG
  • [5] Chattopadhyay A, 2018, AUSTR U POW ENG C AU, P1
  • [6] FPGA Based Cyber Security Protocol for Automated Traffic Monitoring Systems: Proposal and Implementation
    Chattopadhyay, Anupam
    Pudi, Vikramkumar
    Baksi, Anubhab
    Srikanthan, Thambipillai
    [J]. 2016 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2016, : 18 - 23
  • [7] NEW DIRECTIONS IN CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
  • [8] George Mason University, 2017, ATHENA AUT TOOLS HAR ATHENA AUT TOOLS HAR
  • [9] Halevi S., 1999, ACM Trans. Inf. Syst. Secur, V2, P230
  • [10] Park I, 2004, LECT NOTES COMPUT SC, V3043, P527