Abstract
Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks. The vehicle to vehicle (V2V) communication transmits traffic condition data, driving path data, user driving habits data, and so on. It is necessary to ensure the opposite equipment is registered C-V2X equipment (installed in the vehicle), and the data transmitted between the equipment is secure. This paper proposes a V2V identity authentication and key agreement scheme based on identity-based cryptograph (IBC). The C-V2X equipment use its vehicle identification (VID) as its public key. The key management center (KMC) generates a private key for the C-V2X equipment according to its VID. The C-V2X equipment transmit secret data encrypted with the opposite equipment public key to the other equipment, they authenticate each other through a challenge response protocol based on identity-based cryptography, and they negotiate the working key used to encrypt the communication data. The scheme can secure the V2V communication with low computational cost and simple architecture and meet the lightweight and efficient communication requirements of the C-V2X system.
Subject
Computer Networks and Communications
Reference17 articles.
1. LTE-V: A TD-LTE-Based V2X Solution for Future Vehicular Network;Chen;IEEE Internet Things J.,2016
2. A Vision of C-V2X: Technologies, Field Testing, and Challenges with Chinese Development;Chen;IEEE Internet Things J.,2020
3. Cyber Security Challenges and Solutions for V2X Communications: A Survey;Alnasser;Comput. Netw.,2019
4. Ivanov, I., Maple, C., Watson, T., and Lee, S. (2018). Living in the Internet of Things: Cybersecurity of the IoT–2018, Available online: http://wrap.warwick.ac.uk/106474/1/WRAP-Cyber-security-standards-issues-communications-vehicles-Ivanov-2018.pdf.
5. IMT-2020(5G) Promotion Group (2019, July 01). LTE-V2X Security Technology. Available online: http://www.IMT-2020.cn.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献