Work-in-Progress: SAFE: Secure Authentication for Future Entities Using Internet of Vehicles
01 Dec 2019-pp 560-563
TL;DR: A Secure Authentication for Future Entities (SAFE) protocol is proposed, which uses cryptographic operations for enhancing security and preserving privacy in a smart city to which a vehicle can communicate.
Abstract: The innovations in wireless communication technologies, cloud computing, connected vehicles, autonomous vehicles, the Internet of everything, etc. opened a way for the creation, development, advancement, and establishment of vehicular networks for emerging smart city applications. Among them, automated and connected vehicle technologies are among the most researched topics. The currently available concepts are only a fraction of what is being developed for the future. In connected vehicles, the Internet of Vehicles (IoVs) is a promising concept where cars or vehicles can use various communication technologies to communicate with the driver or other entities on the road. In this paper, we explore the future entities in a smart city to which a vehicle can communicate. Moreover, we investigate the importance of warning messages for reducing road transportation issues as IoVs already proved that it could reduce worldwide traffic issues, accident rates, transportation issues, etc. to a particular extent. In spite of several attractive features, ensuring security and lightweight property is one of the challenges in an IoV scenario. Therefore, we propose a Secure Authentication for Future Entities (SAFE) protocol, which uses cryptographic operations for enhancing security and preserving privacy.
Citations
More filters
[...]
01 May 2021
1 citations
[...]
12 Sep 2022
TL;DR: In this article , a lightweight and secure authentication scheme for Internet of Vehicles (IoV) is proposed, which is resistant to a larger number of attacks compared to state-of-the-art authentication solutions.
Abstract: Autonomous message propagation in Internet of Vehicles (IoV) need to be secure to guarantee safety. In fact, a malicious user propagating false information may cause accidents impacting on the safety of both vehicles and drivers. Authentication should however account for the time-critical nature of messages impacting the vehicles behavior. Furthermore, it should account for the resource-limited nature of vehicles. Currently available authentication protocols fail in providing a secure and lightweight solution in terms of computation time, communication cost, and storage cost. Furthermore, as we later show, they are vulnerable to multiple attacks.In this paper, we propose Method for Lightweight and Secure Communication (MeLSeC), a novel lightweight and secure authentication scheme for IoV. Compared to state-of-the-art authentication solutions, MeLSeC is resistant to a larger number of attacks. We test MeLSeC against multiple attacks using Automated Validation of Internet Security Protocols (AVISPA), and show its higher security guarantees against other relevant state-of-the-art solutions. By comparing it with other relevant state-of-the-art solutions, we show that MeLSeC provides up to 700 times smaller computation costs on a desktop computer and up to 4 times smaller computation cost on Raspberry Pi. Furthermore, MeLSeC reduces the joint communication and storage costs by up to 7 times.
[...]
TL;DR: In this paper , an authentication-based security framework is designed to serve the purpose of real-time Intelligent Transportation System (ITS) environments, where only authorized users are provided access to the vehicle.
Abstract: Abstract Security and safety have been a critical issue in the field of Intelligent Transportation Systems. Security of both people and vehicles is a matter of concern. In this paper, an authentication-based security framework is designed to serve the purpose. Only authorized users are provided access to the vehicle. The drivers are first registered for driving the vehicle from an authorized and valid source. The next step is the authentication check before one can be given access to the vehicle. There are two alternative methods provided for the authentication check in the solution depending upon the situation the vehicle is in. The solution is an optimally viable solution from the security perspective of the real-time Intelligent Transportation System environment. The results have shown that the security solution fits into the domain very well and performs as per expectations. The solution has been tested on a Vehicle Tracking Device connected to a vehicle. The same solution can be extended to a fleet of vehicles.
References
More filters
[...]
TL;DR: An overview of the Internet of Things with emphasis on enabling technologies, protocols, and application issues, and some of the key IoT challenges presented in the recent literature are provided and a summary of related research work is provided.
Abstract: This paper provides an overview of the Internet of Things (IoT) with emphasis on enabling technologies, protocols, and application issues. The IoT is enabled by the latest developments in RFID, smart sensors, communication technologies, and Internet protocols. The basic premise is to have smart sensors collaborate directly without human involvement to deliver a new class of applications. The current revolution in Internet, mobile, and machine-to-machine (M2M) technologies can be seen as the first phase of the IoT. In the coming years, the IoT is expected to bridge diverse technologies to enable new applications by connecting physical objects together in support of intelligent decision making. This paper starts by providing a horizontal overview of the IoT. Then, we give an overview of some technical details that pertain to the IoT enabling technologies, protocols, and applications. Compared to other survey papers in the field, our objective is to provide a more thorough summary of the most relevant protocols and application issues to enable researchers and application developers to get up to speed quickly on how the different protocols fit together to deliver desired functionalities without having to go through RFCs and the standards specifications. We also provide an overview of some of the key IoT challenges presented in the recent literature and provide a summary of related research work. Moreover, we explore the relation between the IoT and other emerging technologies including big data analytics and cloud and fog computing. We also present the need for better horizontal integration among IoT services. Finally, we present detailed service use-cases to illustrate how the different protocols presented in the paper fit together to deliver desired IoT services.
4,809 citations
"Work-in-Progress: SAFE: Secure Auth..." refers background in this paper
[...]
[...]
01 Aug 2008
TL;DR: This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol, which provides communications security over the Internet by allowing client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.
Abstract: This document specifies Version 1.2 of the Transport Layer Security
(TLS) protocol. The TLS protocol provides communications security over
the Internet. The protocol allows client/server applications to
communicate in a way that is designed to prevent eavesdropping,
tampering, or message forgery. [STANDARDS-TRACK]
2,522 citations
"Work-in-Progress: SAFE: Secure Auth..." refers background in this paper
[...]
Book•
[...]
21 Mar 2011
TL;DR: In this article, the authors focus on LTE with full updates including LTE-Advanced to provide a complete picture of the LTE system, including the physical layer, access procedures, broadcast, relaying, spectrum and RF characteristics, and system performance.
Abstract: Based on the bestseller "3G Evolution - HSPA and LTE for mobile broadband" and reflecting the ongoing success of LTE throughout the world, this book focuses on LTE with full updates including LTE-Advanced to provide a complete picture of the LTE system. Overview and detailed explanations are given for the latest LTE standards for radio interface architecture, the physical layer, access procedures, broadcast, relaying, spectrum and RF characteristics, and system performance. Key technologies presented include multi-carrier transmission, advanced single-carrier transmission, advanced receivers, OFDM, MIMO and adaptive antenna solutions, advanced radio resource management and protocols, and different radio network architectures. Their role and use in the context of mobile broadband access in general is explained. Both a high-level overview and more detailed step-by-step explanations of the LTE/LTE-Advanced implementation are given. An overview of other related systems such as GSM/EDGE, HSPA, CDMA2000, and WIMAX is also provided. This book is a 'must-have' resource for engineers and other professionals in the telecommunications industry, working with cellular or wireless broadband technologies, giving an understanding of how to utilize the new technology in order to stay ahead of the competition. The authors of the book all work at Ericsson Research and have been deeply involved in 3G and 4G development and standardisation since the early days of 3G research. They are leading experts in the field and are today still actively contributing to the standardisation of LTE within 3GPP. Includes full details of the latest additions to the LTE Radio Access standards and technologies up to and including 3GPP Release 10Clear explanations of the role of the underlying technologies for LTE, including OFDM and MIMO Full coverage of LTE-Advanced, including LTE carrier aggregation, extended multi-antenna transmission, relaying functionality and heterogeneous deploymentsLTE radio interface architecture, physical layer, access procedures, MBMS, RF characteristics and system performance covered in detail
1,845 citations
[...]
TL;DR: The state-of-the-art approaches, solutions, and technologies across a broad range of projects for vehicular communication systems are surveyed.
Abstract: Numerous technologies have been deployed to assist and manage transportation. But recent concerted efforts in academia and industry point to a paradigm shift in intelligent transportation systems. Vehicles will carry computing and communication platforms, and will have enhanced sensing capabilities. They will enable new versatile systems that enhance transportation safety and efficiency and will provide infotainment. This article surveys the state-of-the-art approaches, solutions, and technologies across a broad range of projects for vehicular communication systems.
816 citations
"Work-in-Progress: SAFE: Secure Auth..." refers background in this paper
[...]
[...]
TL;DR: It now appears that feelings of risk may inform driver decision making, as Taylor originally suggested, but not in terms of risk of collision, but rather in termsOf task difficulty, which clearly distinguishes task difficulty from estimates of statistical risk.
Abstract: Taylor (Taylor, D.H., 1964. Drivers' galvanic skin response and the risk of accident. Ergonomics 7, 439-451) argued that drivers attempt to maintain a constant level of anxiety when driving which Wilde (Wilde, G.J.S., 1982. The theory of risk homeostasis: implications for safety and health. Risk Anal. 2, 209-225) interpreted to be coupled to subjective estimates of the probability of collision. This theoretical paper argues that what drivers attempt to maintain is a level of task difficulty. N ¨¨¨ anen and Summala (N¨ a¨ atR., Summala, H., 1976. Road User Behaviour and Traffic Accidents. North Holland/Elsevier, Amsterdam, New York) similarly rejected the concept of statistical risk as a determinant of driver behaviour, but in so doing fell back on the learning process to generate a largely automatised selection of appropriate safety margins. However it is argued here that driver behaviour cannot be acquired and executed principally in such S-R terms. The concept of task difficulty is elaborated within the framework of the task-capability interface (TCI) model, which describes the dynamic interaction between the determinants of task demand and driver capability. It is this interaction which produces different levels of task difficulty. Implications of the model are discussed regarding variation in performance, resource allocation, hierarchical decision-making and the interdependence of demand and capability. Task difficulty homeostasis is proposed as a key sub-goal in driving and speed choice is argued to be the primary solution to the problem of keeping task difficulty within selected boundaries. The relationship between task difficulty and mental workload and calibration is clarified. Evidence is cited in support of the TCI model, which clearly distinguishes task difficulty from estimates of statistical risk. However, contrary to expectation, ratings of perceived risk depart from ratings of statistical risk but track difficu lty ratings almost perfectly. It now appears that feelings of risk may inform driver decision making, as Taylor originally suggested, but not in terms of risk of collision, but rather in terms of task difficulty. Finally risk homeostasis is presented as a special case of task difficulty homeostasis. © 2005 Elsevier Ltd. All rights reserved.
648 citations
"Work-in-Progress: SAFE: Secure Auth..." refers background in this paper
[...]
Related Papers (5)
[...]
[...]