A Design of Safe Communication Protocol for Secure Service Provision in Vehicular Communication Environments

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Vehicular communication technology is being developed as an intelligent transportation system, and studies are being actively carried out to enhance the safety of vehicle driving and provide services with high efficiency in communication. Vehicular communication technology is evolving rapidly in order to realize fully autonomous vehicles, with the development of information technology (IT) and active technological development in national, enterprise and research institutes. However, the convergence with IT has created a vulnerability to cyber-attacks that occur between the vehicle and the transportation infrastructure, and therefore, research on security technology is required. The study designed a protocol to provide efficient and secure services in the vehicular communication environments. The security of the attack techniques occurring in the existing vehicular communication environment was analyzed and it was confirmed there was efficiency of 49% in the verification process compared to the protocol used in the communication environment and 71% in the verification process.

     

     


  • Keywords


    Vehicular Communication, Safe Communication Protocol, Autonomous Vehicle, Cyber-attacks, Secure Service

  • References


      [1] TTAK.KO-12.0208, “Security Requirements for Vehicle-to-Vehicle Communication,” TTA, 2012. 12. 21.

      [2] TTAK. KO-06.0174, “Requirements for Wide-Area Wireless Communication for ITS/Teleics,” TTA, 2008. 6. 26

      [3] TTAK. K0-12.121241, “Security Requirements for Vehicle-to-Vehicle Communication,” TTA, 2012. 8. 12

      [4] IEEE 1609.2-2013, “IEEE Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages,” April 2013.

      [5] P. Papadimitratos et. al., “Secure Vehicular Communication Systems: Design and Architecture,” IEEE Communications Magazine, Nov. 2008, pp. 100-109.

      [6] PRESERVE (PREeparing SEcuRe VEhicle-to-X Communication Systems) Deliverable 1.1, “Security Requirements of Vehicle Security Architecture,” June 2011.

      [7] J Reinold, JD Bruner, EA Dabbish, WL Fehr, “Method and system for vehicle authentication of a component,” google patents, 2006.

      [8] Ho-Jeon Jung, Jae-Chon Lee, “An Improved Method of FTA and Associated Risk Analysis Reflecting Automotive Functional Safety Standard,” Journal of the Korea Academia-Industrial cooperation Society, Vol. 18, No. 9 pp. 9-17, 2017.

      [9] S.Y Min, K.H Lee, B.W Jin, “A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment,” Journal of the Korea Academia-Industrial cooperation Society, Vol. 17, No. 9 pp. 12-20, 2016.

      [10] S.Y Min, B.W Jin, S.Y Min, K.H Lee, B.W Jin, “A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment,” Journal of the Korea Academia-Industrial cooperation Society, Vol. 16, No. 7 pp. 12-20, 2015.


 

View

Download

Article ID: 25243
 
DOI: 10.14419/ijet.v8i1.4.25243




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.