A comparative performance study of cryptographic algorithms for connected vehicles

被引:5
作者
Fazzat, Abdessamad [1 ]
Khatoun, Rida [1 ]
Labiod, Houda [1 ]
Dubois, Renaud [2 ]
机构
[1] Telecom Paris, LTCI INFRES, Paris, France
[2] Thales Commun & Secur, Colombes, France
来源
2020 FOURTH CYBER SECURITY IN NETWORKING CONFERENCE (CSNET) | 2020年
关键词
connected vehicles; V2X; cryptography; lighweight cryptography; benchmarking;
D O I
10.1109/csnet50428.2020.9265529
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For security applications for connected vehicles, choosing the best cryptographic algorithm is a real challenge. Traditional cryptography does not fit the constraints on the communication (e. g., bandwidth, delay) environment and the protocols defined in the standards do not allow flexibility. In this work, we provide an analysis of the cryptographic algorithms used to secure V2X communications and an overview of lightweight cryptography algorithms in order to select algorithms that might fit the connected vehicles constraints.
引用
收藏
页数:8
相关论文
共 33 条
[11]  
Bernstein D.J., 2015, EDDSA MORE CURVES
[12]  
Biryukov A., State of the art in lightweight symmetric cryptography
[13]  
Bogdanov A, 2011, LECT NOTES COMPUT SC, V6917, P312, DOI 10.1007/978-3-642-23951-9_21
[14]  
Camenisch J, ZONE ENCRYPTION ANON
[15]  
CAR 2 CAR Communication Consortium, 2018, Protection Profile V2X Hardware Security Module, Release 1.3.0
[16]  
Costello C., BRIEF DISCUSSION SEL
[17]  
Dinu D., NIST Workshop on Lightweight Cryptography 2015
[18]  
EVITA Project, 2008, EUROPEAN COMMISSION
[19]   Certificate Based Security Mechanisms in Vehicular Ad-Hoc Networks based on IEC 61850 and IEEE WAVE Standards [J].
Farooq, Shaik Mullapathi ;
Hussain, S. M. Suhail ;
Kiran, Siddavaram ;
Ustun, Taha Selim .
ELECTRONICS, 2019, 8 (01)
[20]  
Festag A, 2015, ELEKTROTECH INFORMAT, V132, P409, DOI 10.1007/s00502-015-0343-0