当前位置: X-MOL 学术EURASIP J. Wirel. Commun. Netw. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Authentication strategies in vehicular communications: a taxonomy and framework
EURASIP Journal on Wireless Communications and Networking ( IF 2.3 ) Pub Date : 2021-05-21 , DOI: 10.1186/s13638-021-01968-6
Mir Ali Rezazadeh Baee , Leonie Simpson , Xavier Boyen , Ernest Foo , Josef Pieprzyk

In intelligent vehicular networks, vehicles have enhanced sensing capabilities and carry computing and communication platforms to enable new versatile systems known as Vehicular Communication (VC) systems. Vehicles communicate with other vehicles and with nearby fixed equipment to support different applications, including those which increase driver awareness of the surroundings. This should result in improved safety and may optimize traffic. However, VC systems are vulnerable to cyber attacks involving message manipulation. Research aimed at tackling this problem has resulted in the proposal of multiple authentication protocols. Several existing survey papers have attempted to classify some of these protocols based on a limited set of characteristics. However, to date there is no generic framework to support the comparison of these protocols and provide guidance for design and evaluation. Most existing classifications either use computation complexity of cryptographic techniques as a criterion, or they fail to make connections between different important aspects of authentication. This paper provides such a framework, proposing a new taxonomy to enable a consistent means of classifying authentication schemes based upon seven main criteria. The main contribution of this study is a framework to enable protocol designers and investigators to adequately compare and select authentication schemes when deciding on particular protocols to implement in an application. Our framework can be applied in design, making choices appropriate for the intended context in both intra-vehicle and inter-vehicle communications. We demonstrate the application of our framework using two different types of case study: individual analysis and hypothetical design. Additionally, this work makes several related contributions. We present the network model, outline the applications, list the communication patterns and the underlying standards, and discuss the necessity of using cryptography and key management in VC systems. We also review the threats, authentication, and privacy requirements in vehicular networks.



中文翻译:

车辆通信中的认证策略:分类法和框架

在智能车辆网络中,车辆具有增强的传感能力,并带有计算和通信平台,以启用称为车辆通信(VC)系统的新型通用系统。车辆与其他车辆以及附近的固定设备进行通信,以支持不同的应用程序,包括那些提高驾驶员对周围环境意识的应用程序。这样可以提高安全性,并可以优化流量。但是,VC系统容易受到涉及消息操纵的网络攻击。针对该问题的研究已经提出了多种认证协议的提议。现有的一些调查论文已尝试根据一组有限的特征对其中一些协议进行分类。然而,迄今为止,还没有通用的框架来支持这些协议的比较并为设计和评估提供指导。大多数现有分类要么使用加密技术的计算复杂性作为标准,要么无法在身份验证的不同重要方面之间建立联系。本文提供了这样一个框架,提出了一种新的分类法,以使一致的方法可以基于七个主要标准对身份验证方案进行分类。这项研究的主要贡献是一个框架,使协议设计者和研究者可以在决定要在应用程序中实现的特定协议时充分比较和选择身份验证方案。我们的框架可以应用于设计中,在车辆内和车辆间通信中做出适合于预期环境的选择。我们使用两种不同类型的案例研究来演示我们框架的应用:个体分析和假设设计。此外,这项工作做出了一些相关的贡献。我们介绍了网络模型,概述了应用程序,列出了通信模式和底层标准,并讨论了在VC系统中使用加密和密钥管理的必要性。我们还将审查车载网络中的威胁,身份验证和隐私要求。列出通信模式和基本标准,并讨论在VC系统中使用加密和密钥管理的必要性。我们还将审查车载网络中的威胁,身份验证和隐私要求。列出通信模式和基本标准,并讨论在VC系统中使用加密和密钥管理的必要性。我们还将审查车载网络中的威胁,身份验证和隐私要求。

更新日期:2021-05-22
down
wechat
bug