Cargando…

Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography

Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications. However, most of the recently proposed V2X security protocols—based...

Descripción completa

Detalles Bibliográficos
Autores principales: Hakeem, Shimaa A. Abdel, El-Gawad, Mohamed A. Abd, Kim, HyungWon
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7582867/
https://www.ncbi.nlm.nih.gov/pubmed/33050065
http://dx.doi.org/10.3390/s20195719
_version_ 1783599289630457856
author Hakeem, Shimaa A. Abdel
El-Gawad, Mohamed A. Abd
Kim, HyungWon
author_facet Hakeem, Shimaa A. Abdel
El-Gawad, Mohamed A. Abd
Kim, HyungWon
author_sort Hakeem, Shimaa A. Abdel
collection PubMed
description Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications. However, most of the recently proposed V2X security protocols—based on the Elliptic Curve Digital Signature Algorithm (ECDSA)—are not efficient enough to support fast processing and reduce the communication overhead between vehicles. ECDSA provides a high-security level at the cost of excessive communication and computation overhead, which motivates us to propose a light-weight message authentication and privacy preservation protocol for V2X communications. The proposed protocol achieves highly secure message authentication at a substantially lower cost by introducing a hash chain of secret keys for a Message Authentication Code (MAC). We implemented the proposed protocol using commercial V2X devices to prove its performance advantages over the standard and non-standard protocols. We constructed real V2X networks using commercial V2X devices that run our implemented protocol. Our extensive experiments with real networks demonstrate that the proposed protocol reduces the communication overhead by 6 times and computation overhead by more than 100 times compared with the IEEE1609.2 standard. Moreover, the proposed protocol reduces the communication overhead by 4 times and the computation overhead by up to 100 times compared with a non-standard security protocol, TESLA. The proposed protocol substantially reduces the average end-to-end delay to 2.5 ms, which is a 24- and 28-fold reduction, respectively, compared with the IEEE1609 and TESLA protocols.
format Online
Article
Text
id pubmed-7582867
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75828672020-10-28 Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography Hakeem, Shimaa A. Abdel El-Gawad, Mohamed A. Abd Kim, HyungWon Sensors (Basel) Article Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications. However, most of the recently proposed V2X security protocols—based on the Elliptic Curve Digital Signature Algorithm (ECDSA)—are not efficient enough to support fast processing and reduce the communication overhead between vehicles. ECDSA provides a high-security level at the cost of excessive communication and computation overhead, which motivates us to propose a light-weight message authentication and privacy preservation protocol for V2X communications. The proposed protocol achieves highly secure message authentication at a substantially lower cost by introducing a hash chain of secret keys for a Message Authentication Code (MAC). We implemented the proposed protocol using commercial V2X devices to prove its performance advantages over the standard and non-standard protocols. We constructed real V2X networks using commercial V2X devices that run our implemented protocol. Our extensive experiments with real networks demonstrate that the proposed protocol reduces the communication overhead by 6 times and computation overhead by more than 100 times compared with the IEEE1609.2 standard. Moreover, the proposed protocol reduces the communication overhead by 4 times and the computation overhead by up to 100 times compared with a non-standard security protocol, TESLA. The proposed protocol substantially reduces the average end-to-end delay to 2.5 ms, which is a 24- and 28-fold reduction, respectively, compared with the IEEE1609 and TESLA protocols. MDPI 2020-10-08 /pmc/articles/PMC7582867/ /pubmed/33050065 http://dx.doi.org/10.3390/s20195719 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Hakeem, Shimaa A. Abdel
El-Gawad, Mohamed A. Abd
Kim, HyungWon
Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography
title Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography
title_full Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography
title_fullStr Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography
title_full_unstemmed Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography
title_short Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography
title_sort comparative experiments of v2x security protocol based on hash chain cryptography
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7582867/
https://www.ncbi.nlm.nih.gov/pubmed/33050065
http://dx.doi.org/10.3390/s20195719
work_keys_str_mv AT hakeemshimaaaabdel comparativeexperimentsofv2xsecurityprotocolbasedonhashchaincryptography
AT elgawadmohamedaabd comparativeexperimentsofv2xsecurityprotocolbasedonhashchaincryptography
AT kimhyungwon comparativeexperimentsofv2xsecurityprotocolbasedonhashchaincryptography