当前位置: X-MOL 学术arXiv.cs.CR › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol
arXiv - CS - Cryptography and Security Pub Date : 2021-05-06 , DOI: arxiv-2105.02664
Felipe Boeira, Mikael Asplund

Vehicular networks will enable a range of novel applications to enhance road traffic efficiency, safety, and reduce fuel consumption. As for other cyber-physical systems, security is essential to the deployment of these applications and standardisation efforts are ongoing. In this paper, we perform a systematic security evaluation of a vehicular platooning protocol through a thorough analysis of the protocol and security standards. We tackle the complexity of the resulting model with a proof strategy based on a relation on keys. The key relation forms a partial order, which encapsulates both secrecy and authenticity dependencies. We show that our order-aware approach makes the verification feasible and proves strong authenticity properties along with secrecy of all keys used throughout the protocol.

中文翻译:

利用密钥的部分顺序来验证车辆组协议的安全性

车载网络将支持一系列新颖的应用,以提高道路交通效率,安全性并减少燃油消耗。对于其他网络物理系统,安全性对于这些应用程序的部署至关重要,并且正在进行标准化工作。在本文中,我们通过对协议和安全性标准的全面分析,对车辆队列协议进行了系统的安全性评估。我们使用基于键关系的证明策略来解决生成模型的复杂性。密钥关系形成部分顺序,该顺序封装了保密性和真实性依赖性。我们证明了我们的订单感知方法使验证变得可行,并证明了整个协议中使用的所有密钥的保密性以及强大的真实性。
更新日期:2021-05-07
down
wechat
bug