Abdulah Jarouf, N. Meskin, S. Al-Kuwari, Mohammad Shakerpour, C. Cassandras
{"title":"网联与自动驾驶汽车合并控制的安全性分析","authors":"Abdulah Jarouf, N. Meskin, S. Al-Kuwari, Mohammad Shakerpour, C. Cassandras","doi":"10.1109/iv51971.2022.9827242","DOIUrl":null,"url":null,"abstract":"Securing traffic flows in internet of vehicles (IoV) environments for connected and automated vehicles (CAVs) is a critical task as it should be done in real-time to allow vehicles’ controllers engagement on time. In this paper, the security of CAV communication at merging points is studied, the insecure vehicle communication is analysed in terms of the possible security threats and consequences, and security goals are then identified to protect the environment. We present a network topology that improves the availability of the system and propose a high-level design of a vehicle authentication protocol based on public key cryptography to authenticate vehicles. Simulation and analysis of the cryptographic functions are done to choose the best fit for vehicle communication, where Rivest-Shamir-Adleman (RSA)-2048 algorithms provide faster and more efficient computations.","PeriodicalId":184622,"journal":{"name":"2022 IEEE Intelligent Vehicles Symposium (IV)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Security Analysis of Merging Control for Connected and Automated Vehicles\",\"authors\":\"Abdulah Jarouf, N. Meskin, S. Al-Kuwari, Mohammad Shakerpour, C. Cassandras\",\"doi\":\"10.1109/iv51971.2022.9827242\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Securing traffic flows in internet of vehicles (IoV) environments for connected and automated vehicles (CAVs) is a critical task as it should be done in real-time to allow vehicles’ controllers engagement on time. In this paper, the security of CAV communication at merging points is studied, the insecure vehicle communication is analysed in terms of the possible security threats and consequences, and security goals are then identified to protect the environment. We present a network topology that improves the availability of the system and propose a high-level design of a vehicle authentication protocol based on public key cryptography to authenticate vehicles. Simulation and analysis of the cryptographic functions are done to choose the best fit for vehicle communication, where Rivest-Shamir-Adleman (RSA)-2048 algorithms provide faster and more efficient computations.\",\"PeriodicalId\":184622,\"journal\":{\"name\":\"2022 IEEE Intelligent Vehicles Symposium (IV)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE Intelligent Vehicles Symposium (IV)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iv51971.2022.9827242\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Intelligent Vehicles Symposium (IV)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iv51971.2022.9827242","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Analysis of Merging Control for Connected and Automated Vehicles
Securing traffic flows in internet of vehicles (IoV) environments for connected and automated vehicles (CAVs) is a critical task as it should be done in real-time to allow vehicles’ controllers engagement on time. In this paper, the security of CAV communication at merging points is studied, the insecure vehicle communication is analysed in terms of the possible security threats and consequences, and security goals are then identified to protect the environment. We present a network topology that improves the availability of the system and propose a high-level design of a vehicle authentication protocol based on public key cryptography to authenticate vehicles. Simulation and analysis of the cryptographic functions are done to choose the best fit for vehicle communication, where Rivest-Shamir-Adleman (RSA)-2048 algorithms provide faster and more efficient computations.