Dynamic Scalable Elliptic Curve Cryptographic Scheme and Its Application to In-Vehicle Security

The design of unified, efficient, and lightweight cryptographic platform for resource-constrained on-board devices such as sensors, microcontrollers, and actuators in the context of Internet of Vehicles remains an open and challenging problem, for both academic and industry. Elliptic curve cryptography (ECC) is considered as a promising encryption algorithm for the next generation communications, as it could provide the same strong security level using relatively smaller key size when compared to the currently used Rivest–Shamir–Adleman algorithm. However, traditional ECCs have the disadvantage of using a fixed curve, making it very easy to be intensively analyzed while being hard to construct a united platform for on-board devices with processors of different instruction lengths. To mitigate the above problem, this paper suggests a dynamic scalable elliptic curve cryptosystem. To synchronize the curve in use, a curve list of different security levels is generated and preserved on both parties. Since both parties randomly choose the curve and the prime number, a extra security level could be provided, so that the security level can still remain the same even using smaller key sizes, while the computation efficiency will be enhanced and the power consumption will be reduced, which is especially suitable for the application in on-board embedded devices. Detailed experimental results illustrate that the presented scheme improves the efficiency by 30% in average when compared with traditional ECC implementations on a similar security level. Therefore, the proposed scalable ECC scheme as a unified cryptographic platform is more economic for these on-board devices in vehicles.

[1]  Sabina Jeschke,et al.  Industrial Internet of Things: Cybermanufacturing Systems , 2016 .

[2]  Erich Wenger,et al.  Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography , 2013, ACNS.

[3]  William M. Daley,et al.  Digital Signature Standard (DSS) , 2000 .

[4]  Martin E. Hellman,et al.  An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.

[5]  Christof Paar,et al.  Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .

[6]  Elaine B. Barker Digital Signature Standard (DSS) [includes Change Notice 1 from 12/30/1996] | NIST , 1994 .

[7]  Joseph H. Silverman,et al.  The arithmetic of elliptic curves , 1986, Graduate texts in mathematics.

[8]  Jianqiang Li,et al.  Automatic Classification of Fetal Heart Rate Based on Convolutional Neural Network , 2019, IEEE Internet of Things Journal.

[9]  Dong Hoon Lee,et al.  A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN , 2015, IEEE Transactions on Intelligent Transportation Systems.

[10]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[11]  Shangguang Wang,et al.  An overview of Internet of Vehicles , 2014, China Communications.

[12]  Wenjia Li,et al.  Policy-Based Secure and Trustworthy Sensing for Internet of Things in Smart Cities , 2018, IEEE Internet of Things Journal.

[13]  Wenyuan Xu,et al.  Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study , 2010, USENIX Security Symposium.

[14]  Jonathan Petit,et al.  Remote Attacks on Automated Vehicles Sensors : Experiments on Camera and LiDAR , 2015 .

[15]  Glenn A. Fink,et al.  Security and Privacy in Cyber-Physical Systems , 2017 .

[16]  Hwajeong Seo,et al.  On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age , 2017, IEEE Transactions on Dependable and Secure Computing.

[17]  Ari Juels,et al.  Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.

[18]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[19]  Qun Li,et al.  Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper) , 2006, ICICS.

[20]  Wenjia Li,et al.  ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[21]  Weixin Xie,et al.  An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[22]  Craig Costello,et al.  Selecting elliptic curves for cryptography: an efficiency and security analysis , 2016, Journal of Cryptographic Engineering.

[23]  Christian Brecher,et al.  Cyber-Physical Systems: Foundations, Principles and Applications , 2016 .

[24]  Sabina Jeschke,et al.  Smart Cities: Foundations, Principles, and Applications , 2017 .

[25]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[26]  W. Marsden I and J , 2012 .