This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Decentralized Secure Protocol for Inter-Vehicle Communication Networks
Technical Paper
2006-01-1493
ISSN: 0148-7191, e-ISSN: 2688-3627
Annotation ability available
Sector:
Language:
English
Abstract
In this paper, we propose a secure protocol for inter-vehicle communication (IVC) networks without the use of centralized roadside infrastructure. Future vehicles may use wireless IVC networks to exchange safety-critical information among each other. IVC networks do not have a centralized control, and instead rely on vehicles to coordinate with each other to exchange information. Because of the open medium, security is a concern in IVC networks. Vehicles need a mechanism to authenticate the safety-critical information that will be exchanged in IVC networks. A trusted third party Certificate Authority (CA) can provide such a mechanism through public-key certificates. However, the disadvantage of using public-key certificates is that drivers can identify each other. The certificate will allow drivers to trace each other's movements and will raise a privacy concern. In this paper, we propose to use RSA public key algorithm and Digital Signature Algorithm (DSA) to solve the security and privacy concerns in IVC networks. The paper presents a detailed description of our protocol, and shows its performance analysis in terms of processing times.
Citation
Rabadi, N. and Mahmud, S., "Decentralized Secure Protocol for Inter-Vehicle Communication Networks," SAE Technical Paper 2006-01-1493, 2006, https://doi.org/10.4271/2006-01-1493.Also In
SAE 2006 Transactions Journal of Passenger Cars: Electronic and Electrical Systems
Number: V115-7; Published: 2007-03-30
Number: V115-7; Published: 2007-03-30
References
- http://www.its.dot.gov/
- http://www.itsa.org/
- ITU-T Recommendation X.509, The Directory-Authentication Framework 1993 International Telecommunication Union Geneva, Switzerland
- Capkun S. Hubaux J.-P. Jakobsson M. “Secure and privacy-preserving communication in hybrid ad hoc networks,” EPFL I&C Technical Reports in Computer and Communication Sciences 2004
- Zhu J. Ma J. “A new authentication scheme with anonymity for wireless environments,” IEEE Transactions on Consumer Electronics 50 1 231 235 Feb 2004
- Asokan N. “Anonymity in a mobile computing environment,” Proc. of IEEE Workshop on Mobile Computing Systems and Applications 8-9 Dec. 1994 200 204
- Samfat D. Molva R. “A method providing identity privacy to mobile users during authentication,” Proc. of IEEE Workshop on Mobile Computing Systems and Applications 8-9 Dec. 1994 196 199
- Askwith B. Merabti M. Shi Q. Whiteley K. “Achieving user privacy in mobile networks,” Proc. of IEEE 13th Annual Computer Security Applications Conference 8-12 Dec. 1997 108 116
- Sun Crypto Accelerator 1000 Specifications SUN MICROSYSTEMS, Inc. Palo Alto, CA 2002 http://www.sun.com/products/networking/sslaccel/suncryptoaccel1000/sun_crypto_100_ds.pdf
- BCM5820 eCommerce Processor Data Sheet Broadcom Corporation Irvine, CA 2002
- IBM 4758 Models 2 and 23 PCI Cryptographic Coprocessor Technical Specifications IBM Corporation Somers, NY 2004
- SafeXcel-1841 Product Brief SafeNet Inc. Belcamp, MD 2005