Javascript must be enabled to continue!
Improving authentication and key management for intra and inter vehicular communication
View through CrossRef
There are two types of vehicular communications: intra-vehicular and inter-vehicular. Widely used intra-vehicular communications protocols include Controller Area Network (CAN) 2.0B and Society of Automotive Engineers (SAE) J1939. Neither CAN 2.0B or SAE J1939 have included security mechanisms to prevent adversarial attacks. Adversaries may modify messages without detection. Inter-vehicular communications includes both vehicle-to-infrastructure and vehicle-to-vehicle communications. These are also vulnerable to attack. Manipulation of vehicular communications can have physical consequences endangering human life. This work aims to address this by analysing existing authentication protocols and designing secure authentication mechanisms for inter-vehicular and intra-vehicular communications to prevent certain adversarial attacks.
Title: Improving authentication and key management for intra and inter vehicular communication
Description:
There are two types of vehicular communications: intra-vehicular and inter-vehicular.
Widely used intra-vehicular communications protocols include Controller Area Network (CAN) 2.
0B and Society of Automotive Engineers (SAE) J1939.
Neither CAN 2.
0B or SAE J1939 have included security mechanisms to prevent adversarial attacks.
Adversaries may modify messages without detection.
Inter-vehicular communications includes both vehicle-to-infrastructure and vehicle-to-vehicle communications.
These are also vulnerable to attack.
Manipulation of vehicular communications can have physical consequences endangering human life.
This work aims to address this by analysing existing authentication protocols and designing secure authentication mechanisms for inter-vehicular and intra-vehicular communications to prevent certain adversarial attacks.
Related Results
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Background/Objectives: Due to the development of mobile communication technology, infrastructure construction from 4G to 5G service, which is currently being serviced, is actively ...
A KCP-DCNN-Based Two-Step Verification Multimodal Biometric Authentication System featuring QR Code Fabrication
A KCP-DCNN-Based Two-Step Verification Multimodal Biometric Authentication System featuring QR Code Fabrication
Abstract
Starting with for, need change Enhanced authentication performance, the concept of multi-biometrics authentication systems has emerged as a promising solution in t...
EVALUATING USER AUTHENTICATION PROTOCOLS AND SECURITY ALGORITHMS FOR NETWORKS
EVALUATING USER AUTHENTICATION PROTOCOLS AND SECURITY ALGORITHMS FOR NETWORKS
This paper addresses the want for evaluating consumer authentication protocols and protection algorithms for
networks. Specially, this paper specializes in the effectiveness and sa...
Intelligent clustering using moth flame optimizer for vehicular ad hoc networks
Intelligent clustering using moth flame optimizer for vehicular ad hoc networks
Vehicular ad hoc networks consist of access points for communication, transmission, and collecting information of nodes and environment for managing traffic loads. Clustering can b...
Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key
Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key
The security of Quantum Secure Direct Communication (QSDC) and its authentication procedure based on multiple stages is analyzed. The security analysis shows that the process of au...
Architecture of Vehicular Ad Hoc Network
Architecture of Vehicular Ad Hoc Network
Over the last few years Vehicular Ad hoc Networks (VANETs) have gained much attention within the automobile industry and the research applications. Vehicular Ad hoc networks (VANET...

