19
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications. However, most of the recently proposed V2X security protocols—based on the Elliptic Curve Digital Signature Algorithm (ECDSA)—are not efficient enough to support fast processing and reduce the communication overhead between vehicles. ECDSA provides a high-security level at the cost of excessive communication and computation overhead, which motivates us to propose a light-weight message authentication and privacy preservation protocol for V2X communications. The proposed protocol achieves highly secure message authentication at a substantially lower cost by introducing a hash chain of secret keys for a Message Authentication Code (MAC). We implemented the proposed protocol using commercial V2X devices to prove its performance advantages over the standard and non-standard protocols. We constructed real V2X networks using commercial V2X devices that run our implemented protocol. Our extensive experiments with real networks demonstrate that the proposed protocol reduces the communication overhead by 6 times and computation overhead by more than 100 times compared with the IEEE1609.2 standard. Moreover, the proposed protocol reduces the communication overhead by 4 times and the computation overhead by up to 100 times compared with a non-standard security protocol, TESLA. The proposed protocol substantially reduces the average end-to-end delay to 2.5 ms, which is a 24- and 28-fold reduction, respectively, compared with the IEEE1609 and TESLA protocols.

          Related collections

          Most cited references32

          • Record: found
          • Abstract: not found
          • Article: not found

          An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs

                Bookmark

                Author and article information

                Journal
                Sensors (Basel)
                Sensors (Basel)
                sensors
                Sensors (Basel, Switzerland)
                MDPI
                1424-8220
                08 October 2020
                October 2020
                : 20
                : 19
                : 5719
                Affiliations
                [1 ]School of Electronics Engineering, Chungbuk National University, Cheongju 28644, Korea; shimaakotb@ 123456cbnu.ac.kr
                [2 ]Electronics Research Institute (ERI), Giza 12622, Egypt
                [3 ]School of Electrical Engineering, Korea University, Seoul 02841, Korea; mgawad@ 123456korea.ac.kr
                [4 ]National Telecommunication Institute, Cairo 11768, Egypt
                Author notes
                [* ]Correspondence: hwkim@ 123456cbnu.ac.kr
                Author information
                https://orcid.org/0000-0001-8945-8664
                https://orcid.org/0000-0002-7898-9854
                https://orcid.org/0000-0003-2602-2075
                Article
                sensors-20-05719
                10.3390/s20195719
                7582867
                33050065
                19bb8072-d1a3-4592-be9d-4f560f2310d1
                © 2020 by the authors.

                Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license ( http://creativecommons.org/licenses/by/4.0/).

                History
                : 25 August 2020
                : 29 September 2020
                Categories
                Article

                Biomedical engineering
                mac algorithm,hash-chain,privacy,commercial v2x devices,authentication,ieee1609.2,etsi-103-097

                Comments

                Comment on this article