4.6 Article

Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography

期刊

SENSORS
卷 20, 期 19, 页码 -

出版社

MDPI
DOI: 10.3390/s20195719

关键词

MAC algorithm; hash-chain; privacy; commercial V2X devices; authentication; IEEE1609; 2

资金

  1. IITP [2020-0-01304]
  2. Grand Information Technology Research Center support program [IITP-2020-0-01462]
  3. MSIT (Ministry of Science and ICT), Korean government
  4. Industry coupled IoT Semiconductor System Convergence Nurturing Center under System Semiconductor Convergence Specialist Nurturing Project - National Research Foundation (NRF) of Korea [2020M3H2A107678611]

向作者/读者索取更多资源

Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications. However, most of the recently proposed V2X security protocols-based on the Elliptic Curve Digital Signature Algorithm (ECDSA)-are not efficient enough to support fast processing and reduce the communication overhead between vehicles. ECDSA provides a high-security level at the cost of excessive communication and computation overhead, which motivates us to propose a light-weight message authentication and privacy preservation protocol for V2X communications. The proposed protocol achieves highly secure message authentication at a substantially lower cost by introducing a hash chain of secret keys for a Message Authentication Code (MAC). We implemented the proposed protocol using commercial V2X devices to prove its performance advantages over the standard and non-standard protocols. We constructed real V2X networks using commercial V2X devices that run our implemented protocol. Our extensive experiments with real networks demonstrate that the proposed protocol reduces the communication overhead by 6 times and computation overhead by more than 100 times compared with the IEEE1609.2 standard. Moreover, the proposed protocol reduces the communication overhead by 4 times and the computation overhead by up to 100 times compared with a non-standard security protocol, TESLA. The proposed protocol substantially reduces the average end-to-end delay to 2.5 ms, which is a 24- and 28-fold reduction, respectively, compared with the IEEE1609 and TESLA protocols.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据