Performance Analysis of Authentication Protocols Used Within Cooperative - Intelligent Transportation Systems with Focus on Security
The authors of this contribution focus on analysis of V2V communication security solutions in Cooperative - Intelligent Transportation Systems (C-ITS). They emerge from the current state of risks and potential security incidents within communication between moving nodes. In more detail, they focus on the service of message nonrepundation and message recency, which utilises the cryptographic digital signatures techniques in combination with timestamps. The experimental part analyses security solutions with three types of cryptographic digital signatures techniques for two traffic scenarios based on actual traffic data from the D1 highway. The results are studied in dependence on the most frequent required application parameters for the transmission of safety relevant messages, like message length, cryptographic header length, message processing time and delay in relation to network throughput.
KeywordsCooperative-intelligent transportation system VANET V2V V2X Security architecture Authentication protocols Cryptography algorithms Traffic scenario Modelling
This work has been supported by the Educational Grant Agency of the Slovak Republic (KEGA) Number: 008ŽU-4/2015: Innovation of HW and SW tools and methods of laboratory education focused on safety aspects of ICT within safety critical applications of processes control.
- 1.Mikulski, J.: Telematic technologies in transportation. In: Janecki, R., Sierpiński, G. (eds.) Contemporary Transportation Systems. Selected Theoretical and Practical Problems. New Culture of mobility, pp. 131–143. Publishing House of the Silesian University of Technology. Monograph no. 324, Gliwice (2011)Google Scholar
- 2.http://www.etsi.org/technologies-clusters/technologies/intelligent-transport/dsrc. Accessed from 5 January 2015
- 3.VANET SeVeCom. http://www.sevecom.org. Accessed from 14 January 2015
- 4.CARLINK: Wireless Traffic Service Platform for Linking Cars. http://carlink.lcc.uma.es. Accessed from 29 January 2015
- 5.SeVeCom. Secure Vehicular Communications: Security Architecture and Mechanisms for V2V/V2I, Deliverable 2.1, 2007–2008. http://www.sevecom.org. Accessed from 16 January 2015
- 6.Car2Car Communication Consortium. http://www.car-2-car.org/. Accessed from 16 January 2015
- 9.Bubeníková, E., Franeková, M., Holečko, P.: Security increasing trends in intelligent transportation systems utilising modern image processing methods. In: Mikulski, J. (ed.) Telematics in the Transport Environment, Springer, Heidelberg, CCIS 395, pp. 353–360 (2013)Google Scholar
- 11.Oo, M.Z., Lumpur, K., Othman, M.: Analysis of single-path and multi-path AODVs over Manhattan Grid mobility model for mobile Ad hoc networks. In: International Conference Electronics and Information Engineering (ICEIE), ISBN: 978-1-4244-7679-4 (2010)Google Scholar
- 13.Mardberg, L.: Security in Cooperative Systems within intelligent Transport Systems. Master of Science Thesis. Chalmers of University of Technology, Göteborg, Sweden (2011)Google Scholar
- 14.Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. Spec. Issue Secur. Ad Hoc Sensor Netw. 15(1), 39–68 (2007)Google Scholar
- 15.Intelligent Transport Systems & Services SDT: http://www.sdt.cz/. Accessed from January 10, 2015