Research on Identity Authentication in V2X Communications Based on Elliptic Curve Encryption Algorithm

被引:0
|
作者
Zhang J. [1 ]
Li F. [1 ]
Li R. [1 ]
Li Y. [1 ]
Song J. [1 ]
Zhou Q. [1 ]
机构
[1] Cyberspace Security College, Chengdu University of Information Technology, Chengdu
来源
关键词
Elliptic curve encryption algorithm; Identity authentication; Internet of vehicles; Network safety;
D O I
10.19562/j.chinasae.qcgc.2020.01.004
中图分类号
学科分类号
摘要
With the development of automotive information technology, the internet of vehicles (IOV) between vehicles and vehicle-cloud interconnected communication has become a reality. However, while the IOV brings convenience to people, it also gives hackers the opportunity to conduct the unauthorized capture or revision of the data packets sent by using fake identity, thus posing a security threat to the user. Therefore, the identity authentication of both parties in vehicle communications plays a vital role in vehicle safety. In this paper, on the basis of comparison on commonly used public key encryption algorithms, it is proposed to use elliptic curve cryptography and other security strategies to verify the authenticity of the connected vehicle network users. The results of experiments show that the adoption of the method proposed to perform the encryption and authentication of inter-vehicle communications effectively ensure the communications security of IOV, with 83% less time consumed compared with traditional public key encryption algorithms. © 2020, Editorial Office of Journal of Building Structures. All right reserved.
引用
收藏
页码:27 / 32
页数:5
相关论文
共 9 条
  • [1] Douceur J.R., The sybil attack, Lecture Notes in Computer Science, 65, 1, pp. 251-260, (2002)
  • [2] Thing V.L.L., Wu J., Autonomous vehicle security: a taxonomy of attacks and defences, IEEE International Conference on Internet of Things, (2017)
  • [3] Chang T.P., Hung K.L., Chou H.T., A K-band FMCW radar with the receiving antenna diversity in the car detection applications, Electromagnetic Compatibility, (2015)
  • [4] Dickmann J., Klappstein J., Hahn M., Et al., Present research activities and future requirements on automotive radar from a car manufacturer's point of view, IEEE Mtt-s International Conference on Microwaves for Intelligent Mobility, (2015)
  • [5] Zhao S., Chen L., Research on the single target recognition of car collision avoidance radar based on the FMCW technology, Advanced Materials Research, 1046, pp. 293-296, (2014)
  • [6] Zhao S., Chen L., Research on target recognition of the millimeter wave car collision avoidance radar based on the LFMCW, Advanced Materials Research, 1056, pp. 244-247, (2014)
  • [7] Dickman J., Appenrodt N., Brenk C., Radar is the key to Mercedes-Benz's robotic car, IEEE Spectrum, 51, 8, pp. 44-49, (2014)
  • [8] Vijayakumara P., Changb V., Deboraha L.J., Et al., Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks, Future Generation Computer Systems, (2016)
  • [9] Song L., Han Q., Liu J., Investigate key management and authentication models in VANETs, 2011 International Conference on Electronics, Communications and Control (ICECC), pp. 1516-1519, (2011)