A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications

被引:9
作者
RezazadehBaee, Mir Ali [1 ]
Simpson, Leonie [1 ]
Boyen, Xavier [1 ]
Foo, Ernest [2 ,3 ]
Pieprzyk, Josef [3 ,4 ,5 ]
机构
[1] Queensland Univ Technol, Sch Comp Sci, Brisbane, Qld 4000, Australia
[2] Griffith Univ, Sch Informat & Commun Technol, Nathan, Qld 4111, Australia
[3] Queensland Univ Technol, Sch Comp Sci, Brisbane, Qld 4000, Australia
[4] Commonwealth Sci & Ind Res Org, Data61, Eveleigh, NSW 2122, Australia
[5] Polish Acad Sci, Inst Comp Sci, PL-01248 Warsaw, Poland
基金
澳大利亚研究理事会;
关键词
Authentication; Safety; Protocols; Vehicles; Delays; Standards; Vehicular ad hoc networks; Cryptography; vehicular communication systems; authentication delay; IEEE; 802; 11p simulation; efficient authentication; EFFICIENCY; TIME;
D O I
10.1109/TVT.2021.3097088
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the near future, Vehicle-to-Vehicle (V2V) transmission will enable wireless broadcast communication among nearby vehicles. Benefits for users include improved driver safety and potentially optimized traffic. However, this communication is vulnerable to cyber attacks involving message manipulation. Research aimed at tackling this problem has resulted in the proposal of multiple authentication protocols. The security, privacy, and other desirable features of authentication in vehicular networks have been widely studied. However, the efficiency of such authentication schemes has not been suitably addressed. There is no model to evaluate the efficiency of the proposals in a practical context, where the delay introduced by V2V authentication may impact on driver safety. In this paper, we provide such a model for evaluation. We explicitly present the key factors involved to evaluate the computational delay in the V2V authentication protocols. Our model has clearly defined metrics for computing the delay and evaluating the impact. Developing this model enables future research in the design of secure and efficient V2V authentication protocols suitable for practical application. Applying the model to assess proposed authentication protocols permits categorization based on safety service they can support. We demonstrate the applicability of our model through case studies. Our model can effectively analyze the delay introduced by an authentication protocol, and determine whether this would result in a crash, in the real world vehicular environments.
引用
收藏
页码:9306 / 9319
页数:14
相关论文
共 69 条
[1]  
700 MHz Band Intelligent Transport Systems, 2017, STDT109 ARIB
[2]  
[Anonymous], 2002, P SYST CYB INF
[3]  
[Anonymous], 2012, P 5 ACM ICST INT C S
[4]  
[Anonymous], 2017, IEEE STD 16092A 2017, P1, DOI DOI 10.1109/IEEESTD.2017.8055462
[5]  
[Anonymous], 2016, Standard 802.11-2016 Revision of IEEE Std 802.11-2012, DOI [DOI 10.1109/IEEESTD.2016.7786995, 10.1109/IEEESTD.2016.7786995]
[6]  
[Anonymous], 2010, IEEE Standard 802.11p-2010, DOI DOI 10.1109/IEEESTD.2010.5514475
[7]  
Aranha D.F., RELIC is an Efficient LIbrary for Cryptography
[8]  
Baee M. A. R., 2021, PhD thesis
[9]  
Baee M.A.R., 2014, Master's thesis
[10]   On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side! [J].
Baee, Mir Ali Rezazadeh ;
Simpson, Leonie ;
Boyen, Xavier ;
Foo, Ernest ;
Pieprzyk, Josef .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 (16) :3678-3693