车队内部秘密通信会话的隐藏共享密钥生成

S. Al-Shareeda
{"title":"车队内部秘密通信会话的隐藏共享密钥生成","authors":"S. Al-Shareeda","doi":"10.1109/ISNCC.2019.8909173","DOIUrl":null,"url":null,"abstract":"Convoys or Platoons are groups of autos that can preserve a constricted inter-vehicle space gaps for effective driving on roads. Members of a convoy can share secret sessions that only a convoy-vehicle can decipher. In this sense, convoy-vehicles can encrypt their exchanged data using either the hybrid encryption of the Elliptic Curve Integrated Encryption Scheme or the symmetric encryption of the Advanced Encryption Standard as suggested by the current standards specifications. The symmetric encryption key length is critical for security; if one key is captured, the whole system is compromised. The hybrid encryption is fully contingent upon the beforehand availability of a secure authentication framework. For these two hinted at points, a previous work explored the feasibility of having somewhat homomorphically encrypted keys to be used by any pair of vehicles. The promising obtained results motivated the expansion and modification of the construction to encompass more convoy-vehicles in the creation of the private key instead of only a single pair of vehicles. The analytical results, of two targeted scenarios (with and without a convoy leader), confirm our preliminary work stating that it is feasible to achieve such convoy-wise key establishment with reasonable storage and computation overheads.","PeriodicalId":187178,"journal":{"name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Veiled Shared key Generation for Intra-Convoy Secret Communication Sessions\",\"authors\":\"S. Al-Shareeda\",\"doi\":\"10.1109/ISNCC.2019.8909173\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Convoys or Platoons are groups of autos that can preserve a constricted inter-vehicle space gaps for effective driving on roads. Members of a convoy can share secret sessions that only a convoy-vehicle can decipher. In this sense, convoy-vehicles can encrypt their exchanged data using either the hybrid encryption of the Elliptic Curve Integrated Encryption Scheme or the symmetric encryption of the Advanced Encryption Standard as suggested by the current standards specifications. The symmetric encryption key length is critical for security; if one key is captured, the whole system is compromised. The hybrid encryption is fully contingent upon the beforehand availability of a secure authentication framework. For these two hinted at points, a previous work explored the feasibility of having somewhat homomorphically encrypted keys to be used by any pair of vehicles. The promising obtained results motivated the expansion and modification of the construction to encompass more convoy-vehicles in the creation of the private key instead of only a single pair of vehicles. The analytical results, of two targeted scenarios (with and without a convoy leader), confirm our preliminary work stating that it is feasible to achieve such convoy-wise key establishment with reasonable storage and computation overheads.\",\"PeriodicalId\":187178,\"journal\":{\"name\":\"2019 International Symposium on Networks, Computers and Communications (ISNCC)\",\"volume\":\"181 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Symposium on Networks, Computers and Communications (ISNCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISNCC.2019.8909173\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISNCC.2019.8909173","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

车队或车队是一组汽车,它们可以保持有限的车辆间空间间隙,以便在道路上有效行驶。车队成员可以共享只有车队车辆才能破译的秘密会话。从这个意义上说,车队可以使用椭圆曲线集成加密方案的混合加密或当前标准规范建议的高级加密标准的对称加密来加密它们交换的数据。对称加密密钥长度对安全性至关重要;如果一个密钥被捕获,整个系统就会受到威胁。混合加密完全取决于安全身份验证框架的事先可用性。对于这两点,以前的工作探索了任何一对车辆使用某种同态加密密钥的可行性。有希望获得的结果激励了扩展和修改结构,以在创建私钥时包含更多的护送车辆,而不仅仅是一对车辆。两种目标场景(有和没有车队领导)的分析结果证实了我们的初步工作,即在合理的存储和计算开销下实现这种车队智能密钥建立是可行的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Veiled Shared key Generation for Intra-Convoy Secret Communication Sessions
Convoys or Platoons are groups of autos that can preserve a constricted inter-vehicle space gaps for effective driving on roads. Members of a convoy can share secret sessions that only a convoy-vehicle can decipher. In this sense, convoy-vehicles can encrypt their exchanged data using either the hybrid encryption of the Elliptic Curve Integrated Encryption Scheme or the symmetric encryption of the Advanced Encryption Standard as suggested by the current standards specifications. The symmetric encryption key length is critical for security; if one key is captured, the whole system is compromised. The hybrid encryption is fully contingent upon the beforehand availability of a secure authentication framework. For these two hinted at points, a previous work explored the feasibility of having somewhat homomorphically encrypted keys to be used by any pair of vehicles. The promising obtained results motivated the expansion and modification of the construction to encompass more convoy-vehicles in the creation of the private key instead of only a single pair of vehicles. The analytical results, of two targeted scenarios (with and without a convoy leader), confirm our preliminary work stating that it is feasible to achieve such convoy-wise key establishment with reasonable storage and computation overheads.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信