Cargando…
Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography
Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications. However, most of the recently proposed V2X security protocols—based...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7582867/ https://www.ncbi.nlm.nih.gov/pubmed/33050065 http://dx.doi.org/10.3390/s20195719 |
_version_ | 1783599289630457856 |
---|---|
author | Hakeem, Shimaa A. Abdel El-Gawad, Mohamed A. Abd Kim, HyungWon |
author_facet | Hakeem, Shimaa A. Abdel El-Gawad, Mohamed A. Abd Kim, HyungWon |
author_sort | Hakeem, Shimaa A. Abdel |
collection | PubMed |
description | Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications. However, most of the recently proposed V2X security protocols—based on the Elliptic Curve Digital Signature Algorithm (ECDSA)—are not efficient enough to support fast processing and reduce the communication overhead between vehicles. ECDSA provides a high-security level at the cost of excessive communication and computation overhead, which motivates us to propose a light-weight message authentication and privacy preservation protocol for V2X communications. The proposed protocol achieves highly secure message authentication at a substantially lower cost by introducing a hash chain of secret keys for a Message Authentication Code (MAC). We implemented the proposed protocol using commercial V2X devices to prove its performance advantages over the standard and non-standard protocols. We constructed real V2X networks using commercial V2X devices that run our implemented protocol. Our extensive experiments with real networks demonstrate that the proposed protocol reduces the communication overhead by 6 times and computation overhead by more than 100 times compared with the IEEE1609.2 standard. Moreover, the proposed protocol reduces the communication overhead by 4 times and the computation overhead by up to 100 times compared with a non-standard security protocol, TESLA. The proposed protocol substantially reduces the average end-to-end delay to 2.5 ms, which is a 24- and 28-fold reduction, respectively, compared with the IEEE1609 and TESLA protocols. |
format | Online Article Text |
id | pubmed-7582867 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-75828672020-10-28 Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography Hakeem, Shimaa A. Abdel El-Gawad, Mohamed A. Abd Kim, HyungWon Sensors (Basel) Article Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications. However, most of the recently proposed V2X security protocols—based on the Elliptic Curve Digital Signature Algorithm (ECDSA)—are not efficient enough to support fast processing and reduce the communication overhead between vehicles. ECDSA provides a high-security level at the cost of excessive communication and computation overhead, which motivates us to propose a light-weight message authentication and privacy preservation protocol for V2X communications. The proposed protocol achieves highly secure message authentication at a substantially lower cost by introducing a hash chain of secret keys for a Message Authentication Code (MAC). We implemented the proposed protocol using commercial V2X devices to prove its performance advantages over the standard and non-standard protocols. We constructed real V2X networks using commercial V2X devices that run our implemented protocol. Our extensive experiments with real networks demonstrate that the proposed protocol reduces the communication overhead by 6 times and computation overhead by more than 100 times compared with the IEEE1609.2 standard. Moreover, the proposed protocol reduces the communication overhead by 4 times and the computation overhead by up to 100 times compared with a non-standard security protocol, TESLA. The proposed protocol substantially reduces the average end-to-end delay to 2.5 ms, which is a 24- and 28-fold reduction, respectively, compared with the IEEE1609 and TESLA protocols. MDPI 2020-10-08 /pmc/articles/PMC7582867/ /pubmed/33050065 http://dx.doi.org/10.3390/s20195719 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Hakeem, Shimaa A. Abdel El-Gawad, Mohamed A. Abd Kim, HyungWon Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography |
title | Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography |
title_full | Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography |
title_fullStr | Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography |
title_full_unstemmed | Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography |
title_short | Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography |
title_sort | comparative experiments of v2x security protocol based on hash chain cryptography |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7582867/ https://www.ncbi.nlm.nih.gov/pubmed/33050065 http://dx.doi.org/10.3390/s20195719 |
work_keys_str_mv | AT hakeemshimaaaabdel comparativeexperimentsofv2xsecurityprotocolbasedonhashchaincryptography AT elgawadmohamedaabd comparativeexperimentsofv2xsecurityprotocolbasedonhashchaincryptography AT kimhyungwon comparativeexperimentsofv2xsecurityprotocolbasedonhashchaincryptography |