2020
DOI: 10.3390/s20195719
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography

Abstract: Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications. However, most of the recently proposed V2X security protocols—based on the Elliptic Curve Digital Signature Algorithm (ECDSA)—are not efficient enough to support fast processing and reduce the communication overhead between vehicles. ECDSA provides a high-security level at the cost … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
15
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1
1

Relationship

3
5

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 29 publications
0
15
0
Order By: Relevance
“…In our future work, we intend to improve the proposed authentication methods by integrating them into different 5G applications, as recommended by the authors of [ 38 ]. We also intend to implement the proposed authentication methods using hardware devices and compare the performance with the results of our previous decentralized hash-chain-based protocol [ 39 ].…”
Section: Computation Overhead Analysismentioning
confidence: 99%
“…In our future work, we intend to improve the proposed authentication methods by integrating them into different 5G applications, as recommended by the authors of [ 38 ]. We also intend to implement the proposed authentication methods using hardware devices and compare the performance with the results of our previous decentralized hash-chain-based protocol [ 39 ].…”
Section: Computation Overhead Analysismentioning
confidence: 99%
“…The group key management protocols must provide secure key generation, key distribution, and key updating with a minimum communication overhead [ 1 , 2 , 3 ]. Many group key generation protocols are proposed in the literature; some are based on the symmetric key generation, and some use the asymmetric key generation [ 4 , 5 , 6 ]. Most of the previous asymmetric key generation methods suffer from high communication and computation costs, depending on complex elliptic curve mathematics or bilinear pairing [ 7 ].…”
Section: Introductionmentioning
confidence: 99%
“…However, they prove that this method consume more power and require extra storage which makes it not suitable for IoT networks. In [9,10], the authors proposed an authentication technique based on a hash chain to support decentralized key generation and message authentication using the Message Authentication Code for vehicular communication. In [10], they prove as well how a hash chain is secure and the computation cost is negligible, which makes it suitable for IoT devices.…”
Section: Introductionmentioning
confidence: 99%
“…In [9,10], the authors proposed an authentication technique based on a hash chain to support decentralized key generation and message authentication using the Message Authentication Code for vehicular communication. In [10], they prove as well how a hash chain is secure and the computation cost is negligible, which makes it suitable for IoT devices. The authors of [11] present a Secure Sensor Cloud Architecture (SASC) for IoT networks to support data efficiency and improve network security and scalability.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation