A Security Model for Intelligent Vehicles and Smart Traffic Infrastructure

Intelligent vehicles require to communicate with other vehicles as well as with the road-side infrastructure for gathering information such as traffic management, cooperative driving, telematics and road construction. However, vehicle-to vehicle (V2V) and vehicle to infrastructure (V2I) communications can impose some serious security threats against vehicles’ safety and other sensitive information which can lead to catastrophic consequences. Therefore, there is a pressing need to develop appropriate security protocols facilitating V2I and V2V communication. This paper presents a model for smart traffic infrastructure consisting of numerous entities like smart sensors, intelligent vehicles, base stations along with a new user authentication and key-exchange protocol which aids in the establishment of a secure session for communication between the entities. In the proposed protocol, any SUF-CMA (Strong Unforgeable- Chosen Message Attack) secure digital signature algorithm can be used for authenticating the users and any NM-CCA2 (Non-Malleability Chosen Ciphertext Attack) secure algorithm can also be used for the challenge response phase between the users authenticating themselves.

[1]  Hugo Krawczyk,et al.  Public-key cryptography and password protocols , 1999 .

[2]  Muhammad Bilal,et al.  An Authentication Protocol for Future Sensor Networks , 2017, Sensors.

[3]  Rong Fan,et al.  A secure and efficient user authentication protocol for two-tiered wireless sensor networks , 2010, 2010 Second Pacific-Asia Conference on Circuits, Communications and System.

[4]  Péter Gáspár,et al.  Security issues and vulnerabilities in connected car systems , 2015, 2015 International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS).

[5]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[6]  Kwok-Yan Lam,et al.  Wireless Communication and Security Issues for Cyber–Physical Systems and the Internet-of-Things , 2018, Proceedings of the IEEE.

[7]  J. Alex Halderman,et al.  Green Lights Forever: Analyzing the Security of Traffic Infrastructure , 2014, WOOT.

[8]  Thambipillai Srikanthan,et al.  FPGA Based Cyber Security Protocol for Automated Traffic Monitoring Systems: Proposal and Implementation , 2016, 2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).

[9]  Tang Chunming,et al.  A secure user authentication protocol for sensor network in data capturing , 2015 .

[10]  IkSu Park,et al.  User Authentication Protocol Based on Human Memorable Password and Using RSA , 2004, ICCSA.

[11]  Kwok-Yan Lam,et al.  Security of autonomous vehicle as a cyber-physical system , 2017, 2017 7th International Symposium on Embedded Computing and System Design (ISED).