Performance Analysis of Authentication Protocols Used Within Cooperative - Intelligent Transportation Systems with Focus on Security

  • Ján ĎurechEmail author
  • Mária Franeková
  • Peter Holečko
  • Emília Bubeníková
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 531)


The authors of this contribution focus on analysis of V2V communication security solutions in Cooperative - Intelligent Transportation Systems (C-ITS). They emerge from the current state of risks and potential security incidents within communication between moving nodes. In more detail, they focus on the service of message nonrepundation and message recency, which utilises the cryptographic digital signatures techniques in combination with timestamps. The experimental part analyses security solutions with three types of cryptographic digital signatures techniques for two traffic scenarios based on actual traffic data from the D1 highway. The results are studied in dependence on the most frequent required application parameters for the transmission of safety relevant messages, like message length, cryptographic header length, message processing time and delay in relation to network throughput.


Cooperative-intelligent transportation system VANET V2V V2X Security architecture Authentication protocols Cryptography algorithms Traffic scenario Modelling 



This work has been supported by the Educational Grant Agency of the Slovak Republic (KEGA) Number: 008ŽU-4/2015: Innovation of HW and SW tools and methods of laboratory education focused on safety aspects of ICT within safety critical applications of processes control.


  1. 1.
    Mikulski, J.: Telematic technologies in transportation. In: Janecki, R., Sierpiński, G. (eds.) Contemporary Transportation Systems. Selected Theoretical and Practical Problems. New Culture of mobility, pp. 131–143. Publishing House of the Silesian University of Technology. Monograph no. 324, Gliwice (2011)Google Scholar
  2. 2.
  3. 3.
    VANET SeVeCom. Accessed from 14 January 2015
  4. 4.
    CARLINK: Wireless Traffic Service Platform for Linking Cars. Accessed from 29 January 2015
  5. 5.
    SeVeCom. Secure Vehicular Communications: Security Architecture and Mechanisms for V2V/V2I, Deliverable 2.1, 2007–2008. Accessed from 16 January 2015
  6. 6.
    Car2Car Communication Consortium. Accessed from 16 January 2015
  7. 7.
    Hofman, U., Rieder, A., Dickmanns, E.: Radar vision data function for hybrid adaptive cruise control on highways. Mach. Vis. Appl. 14(1), 42–49 (2003)CrossRefGoogle Scholar
  8. 8.
    Huang, A.S., et al.: Finding multiple lanes in urban road networks with vision and lidar. Auton. Robots 26(2), 103–122 (2009)CrossRefGoogle Scholar
  9. 9.
    Bubeníková, E., Franeková, M., Holečko, P.: Security increasing trends in intelligent transportation systems utilising modern image processing methods. In: Mikulski, J. (ed.) Telematics in the Transport Environment, Springer, Heidelberg, CCIS 395, pp. 353–360 (2013)Google Scholar
  10. 10.
    Hruboš, M., Janota, A.: Algorithm for surface creation from a cloud of points. In: Mikulski, J. (ed.) TST 2013. CCIS, vol. 395, pp. 42–49. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  11. 11.
    Oo, M.Z., Lumpur, K., Othman, M.: Analysis of single-path and multi-path AODVs over Manhattan Grid mobility model for mobile Ad hoc networks. In: International Conference Electronics and Information Engineering (ICEIE), ISBN: 978-1-4244-7679-4 (2010)Google Scholar
  12. 12.
    Roy, R.R.: Handbook of Mobile Ad Hoc Networks for Mobility Models. Springer, London (2011). ISBN 978-1-4419-6048-1CrossRefzbMATHGoogle Scholar
  13. 13.
    Mardberg, L.: Security in Cooperative Systems within intelligent Transport Systems. Master of Science Thesis. Chalmers of University of Technology, Göteborg, Sweden (2011)Google Scholar
  14. 14.
    Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. Spec. Issue Secur. Ad Hoc Sensor Netw. 15(1), 39–68 (2007)Google Scholar
  15. 15.
    Intelligent Transport Systems & Services SDT: Accessed from January 10, 2015
  16. 16.
    Franeková, Mária, Lüley, Peter: Security of digital signature schemes for Car-to-Car communications within intelligent transportation systems. In: Mikulski, Jerzy (ed.) TST 2013. CCIS, vol. 395, pp. 258–267. Springer, Heidelberg (2013)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Ján Ďurech
    • 1
    Email author
  • Mária Franeková
    • 1
  • Peter Holečko
    • 1
  • Emília Bubeníková
    • 1
  1. 1.Faculty of Electrical Engineering, Department of Control and Information SystemsUniversity of ŽilinaŽilinaSlovak Republic

Personalised recommendations