Evaluation of a zone encryption scheme for vehicular networks
Ver/
Compartir
Estadísticas
Ver Estadísticas de usoMetadatos
Mostrar el registro completo del ítemAutor
Gallego Madrid, Jorge; Sánchez Iborra, Ramón Jesús; Santa Lozano, José; Gómez Skarmeta, Antonio F.; Gallego Madrid, JorgeÁrea de conocimiento
Ingeniería TelemáticaPatrocinadores
This work has been supported by the Spanish Ministry of Science, Innovation and Universities, under the Ramon y Cajal Program (Grant No. RYC2017-23823) and the projects PERSEIDES (Grant No. TIN2017-86885-R with ERDF funds) and Go2Edge (RED2018-102585-T); and by the European Commission, under the projects 5G-MOBIX (Grant No. 825496) and INSPIRE-5Gplus (Grant No. 871808).Fecha de publicación
2020-12-09Editorial
ElsevierCita bibliográfica
Jorge Gallego-Madrid, Ramon Sanchez-Iborra, Jose Santa, Antonio Skarmeta, Evaluation of a zone encryption scheme for vehicular networks, Computer Networks, Volume 182, 2020, 107523, ISSN 1389-1286, https://doi.org/10.1016/j.comnet.2020.107523. (https://www.sciencedirect.com/science/article/pii/S138912862031183X)Revisión por pares
siPalabras clave
Zone encryptionVehicular networks
C-ITS
V2V
Security
Resumen
Vehicular communications are bringing a new wave of applications under the umbrella of the Cooperative Intelligent Transportation Systems (C-ITS). To this end, on-board units are expected to send messages periodically or upon the appearance of a relevant event, to feed an awareness ecosystem that enables safety or traffic efficiency services. This is the case of Cooperative Awareness Messages (CAMs) in Europe, which contain basic vehicle information such as its position or speed, among other parameters. From a network security perspective, CAMs are broadcasted unencrypted over an unprotected radio channel, hence enabling their potential interception and the disclosure of sensitive data. Although public key infrastructures (PKI)-like solutions have been proposed, high computational cost of asymmetric cryptography to cipher application data remains a challenge and a confidentiality alternative is needed. In this work, we present the implementation and evaluation of a symmetric encryption ...
Colecciones
- Artículos [1768]
El ítem tiene asociados los siguientes ficheros de licencia:
Redes sociales