Abdessamad Fazzat, R. Khatoun, H. Labiod, Renaud Dubois
{"title":"网联车辆加密算法的性能比较研究","authors":"Abdessamad Fazzat, R. Khatoun, H. Labiod, Renaud Dubois","doi":"10.1109/CSNet50428.2020.9265529","DOIUrl":null,"url":null,"abstract":"For security applications for connected vehicles, choosing the best cryptographic algorithm is a real challenge. Traditional cryptography does not fit the constraints on the communication (e.g., bandwidth, delay) environment and the protocols defined in the standards do not allow flexibility. In this work, we provide an analysis of the cryptographic algorithms used to secure V2X communications and an overview of lightweight cryptography algorithms in order to select algorithms that might fit the connected vehicles constraints.","PeriodicalId":234911,"journal":{"name":"2020 4th Cyber Security in Networking Conference (CSNet)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A comparative performance study of cryptographic algorithms for connected vehicles\",\"authors\":\"Abdessamad Fazzat, R. Khatoun, H. Labiod, Renaud Dubois\",\"doi\":\"10.1109/CSNet50428.2020.9265529\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"For security applications for connected vehicles, choosing the best cryptographic algorithm is a real challenge. Traditional cryptography does not fit the constraints on the communication (e.g., bandwidth, delay) environment and the protocols defined in the standards do not allow flexibility. In this work, we provide an analysis of the cryptographic algorithms used to secure V2X communications and an overview of lightweight cryptography algorithms in order to select algorithms that might fit the connected vehicles constraints.\",\"PeriodicalId\":234911,\"journal\":{\"name\":\"2020 4th Cyber Security in Networking Conference (CSNet)\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 4th Cyber Security in Networking Conference (CSNet)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSNet50428.2020.9265529\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 4th Cyber Security in Networking Conference (CSNet)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSNet50428.2020.9265529","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A comparative performance study of cryptographic algorithms for connected vehicles
For security applications for connected vehicles, choosing the best cryptographic algorithm is a real challenge. Traditional cryptography does not fit the constraints on the communication (e.g., bandwidth, delay) environment and the protocols defined in the standards do not allow flexibility. In this work, we provide an analysis of the cryptographic algorithms used to secure V2X communications and an overview of lightweight cryptography algorithms in order to select algorithms that might fit the connected vehicles constraints.