A comparative performance study of cryptographic algorithms for connected vehicles

被引:5
作者
Fazzat, Abdessamad [1 ]
Khatoun, Rida [1 ]
Labiod, Houda [1 ]
Dubois, Renaud [2 ]
机构
[1] Telecom Paris, LTCI INFRES, Paris, France
[2] Thales Commun & Secur, Colombes, France
来源
2020 FOURTH CYBER SECURITY IN NETWORKING CONFERENCE (CSNET) | 2020年
关键词
connected vehicles; V2X; cryptography; lighweight cryptography; benchmarking;
D O I
10.1109/csnet50428.2020.9265529
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For security applications for connected vehicles, choosing the best cryptographic algorithm is a real challenge. Traditional cryptography does not fit the constraints on the communication (e. g., bandwidth, delay) environment and the protocols defined in the standards do not allow flexibility. In this work, we provide an analysis of the cryptographic algorithms used to secure V2X communications and an overview of lightweight cryptography algorithms in order to select algorithms that might fit the connected vehicles constraints.
引用
收藏
页数:8
相关论文
共 33 条
[1]   Secure LTE-Based V2X Service [J].
Ahmed, Kazi J. ;
Lee, Myung J. .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (05) :3724-3732
[2]  
[Anonymous], 102941 ETSI TS
[3]  
[Anonymous], TRIATHLON LIGHTWEIGH
[4]  
[Anonymous], 2017, Tech. Rep. ETSI TS 103 097
[5]  
[Anonymous], IEEE SA IEEE 802.11-2016
[6]  
[Anonymous], 202 FIPS
[7]  
[Anonymous], 102940 ETSI TS
[8]  
[Anonymous], 2017, IEEE STD 16092A 2017, P1, DOI [10.1109/IEEESTD.2017.8055462, DOI 10.1109/IEEESTD.2017.8055462]
[9]  
[Anonymous], 2008, IEEE Standard for Information Technology Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Networks Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular Environments
[10]  
Bernstein D., 2011, HIGH SPEED HIGHSECUR