Vehicle Guidance System Based on Secure Mobile Communication

  • Chapter
  • First Online:
Intelligent Technologies for Internet of Vehicles

Part of the book series: Internet of Things ((ITTCC))

  • 1341 Accesses

Abstract

Vehicle guidance systems are considered key to improve capacity and safety of transport systems. Information and communication technologies enable both vehicle speeds and distances to be optimized without being limited to human reaction times. As the major two competing topological approaches for communication networks, viz. ad-hoc and cellular networks, exhibit specific advantages and disadvantages in different applications, there is still no standardized solution in the offing. Established encryption methods have either proven to be insecure or lack real-time capabilities when used in distributed automation systems, where the only proven secure concept for encryption – perfect security – has not been employed so far due to practical shortcomings. Meeting existing standards, a communication architecture for vehicle guidance systems allowing for perfectly secure encryption and observing real-time requirements for wireless communication is presented. Its core components are a central instance authenticating all participants, generating and distributing the required keys as well as a transmission infrastructure based on relay stations. Different sensitivity analyses show that one-time pad cryptography can keep up with or even outperform the AES in the presented use case. The keys required for a sufficiently long operating time can be stored on common storage media.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 50.28
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 64.19
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
EUR 64.19
Price includes VAT (Germany)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Integrity check required.

  2. 2.

    With 1 MiB = 1024 KiB = 1024 \(\times \) 1024 B, 1 B=8 bit.

  3. 3.

    With 1 MiB = 1024 KiB = 1024 \(\times \) 1024 B, 1 B=8 bit.

  4. 4.

    With 1 GiB = 1024 MiB = 1024 \(\times \) 1024 KiB = 1024 \(\times \) 1024 \(\times \) 1024 B, 1 B=8 bit.

  5. 5.

    Intel(R) Core(TM) i7-4510U CPU @ 2.00 GHz, 8 GB RAM, 64-bit operating system, Python 3.8.3, pycryptodome 3.9.7, pandas 1.0.3.

References

  1. Directive 2010/40/EU of the European Parliament and of the Council (2010)

    Google Scholar 

  2. Williams, B.: Intelligent Transport Systems Standards. Artech House, Boston (2008)

    Google Scholar 

  3. DIN SPEC 91345:2016-04, Reference Architecture Model Industry 4.0 (RAMI4.0). Beuth Verlag, Berlin (2016)

    Google Scholar 

  4. Sommer, C., Dressler, F.: Vehicular Networking. Cambridge University Press, Cambridge (2015)

    Google Scholar 

  5. SAE J 3016:2018-06-15, Taxonomy and Definitions for Terms Related to Driving Automation Systems for On-Road Motor Vehicles. Beuth Verlag, Berlin (2018)

    Google Scholar 

  6. Bagloee, S., Tavana, M., Asadi, M.: et al.: Autonomous vehicles: challenges, opportunities, and future implications for transportation policies. J. Mod. Transp. 24, 284–303 (2016)

    Google Scholar 

  7. Tahir, M.N., Mäenpää, K., Sukuvaara, T.: Evolving wireless vehicular communication system level comparison and analysis of 802.11p, 4G, 5G. In: International Conference on Communication, Computing and Digital systems (C-CODE), pp. 48–52 (2019)

    Google Scholar 

  8. Medhi, D., Ramasamy, K.: Network Routing: Algorithms, Protocols, and Architectures. Morgan Kaufmann, Cambridge (2017)

    Google Scholar 

  9. Soyata, T: Enabling Real-Time Mobile Cloud Computing Through Emerging Technologies. IGI Global, Hershey (2015)

    Google Scholar 

  10. Oorni, R., Goulart, A.: In-vehicle emergency call services: eCall and beyond. IEEE Commun. Mag. 55(1), 159–165 (2017)

    Google Scholar 

  11. Kim, S., Noh, W., An, S.: Multi-path ad hoc routing considering path redundancy. In: Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003, vol. 1, pp. 45–50 (2003)

    Google Scholar 

  12. Jiang, D., Delgrossi, L.: IEEE 802.11p: towards an international standard for wireless access in vehicular environments. In: IEEE Vehicular Technology Conference, pp. 2036–2040. IEEE (2008)

    Google Scholar 

  13. Paar, C., Pelzl, J.: Understanding Cryptography. Springer-Verlag, Berlin (2010)

    Google Scholar 

  14. Electronic Frontier Foundation: Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design. O’Reilly (1998)

    Google Scholar 

  15. Kalenderi, M., Pnevmatikatos, D., Papaefstathiou, I., Manifavas, C.: Breaking the GSM A5/1 cryptography algorithm with rainbow tables and high-end FPGAs. In: International Conference on Field Programmable Logic and Applications, pp. 747–753 (2012)

    Google Scholar 

  16. Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Technical report, Massachusetts Institute of Technology (1977) Accessed 07 Jul 2019

    Google Scholar 

  17. Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theor. 31(4), 469–472 (1985)

    Google Scholar 

  18. Hasrouny, H., Samhat, A., Bassil, C., Laouiti, A.: VANet security challenges and solutions: a survey. Veh. Commun. 7, 7–20 (2017)

    Google Scholar 

  19. Shannon, C.: Communication Theory of Secrecy Systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)

    Google Scholar 

  20. ETSI EN 302 637-2, Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service Online (2019). Accessed 02 Jan 2020

    Google Scholar 

  21. ETSI EN 302 637-3, Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 3: Specifications of Decentralized Environmental Notification Basic Service (2019). Accessed 02 Jan 2020

    Google Scholar 

  22. Khattak, H., Farman, H., Jan, B., Din, I.: Toward integrating vehicular clouds with IoT for smart city services. IEEE Netw. 33(2), 65–71 (2019)

    Google Scholar 

  23. Mundhenk, P., et al.: Security in automotive networks: Lightweight authentication and authorization. ACM Trans. Des. Autom. Electron. Syst. 22(2), 1–27 (2017)

    Google Scholar 

  24. Bittl, S., et al.: Emerging attacks on VANET security based on GPS time spoofing. In: 2015 IEEE Conference on Communications and Network Security (CNS), pp. 344–352 (2015)

    Google Scholar 

  25. Levinson, J., et al.: Towards fully autonomous driving: Systems and algorithms. In: 2011 IEEE Intelligent Vehicles Symposium (IV), pp. 163–168 (2011)

    Google Scholar 

  26. Hartenstein, H., Laberteaux, K.: VANET: Vehicular Applications and Inter-Networking Technologies. Wiley, Chichester (2010)

    Google Scholar 

  27. Lee, J., Kim, C.: A roadside unit placement scheme for vehicular telematics networks. In: Kim, T., Adeli, H. (eds.) Advances in Computer Science and Information Technology, Springer-Verlag, Berlin, pp. 196–202 (2010)

    Google Scholar 

  28. Vernam, G.: Secret Signaling System. Patent US 1310719 A (1919)

    Google Scholar 

  29. Statista, de.statista.com (2020). Accessed 12 Sep 2020

  30. Rotem-Gal-Oz, A.: Fallacies of Distributed Computing Explained, Technical Report, Sun Microsystems (1997). Accessed 20 Jul 2020

    Google Scholar 

  31. Kumar, S., Verma, A.: Position based routing protocols in VANET: a survey. Wireless Pers. Commun. 83, 2747–2772 (2015)

    Google Scholar 

  32. Lee, P.U., Idris, H., Helton, D., Davis, T., Lohr, G., Oseguera-Lohr, R.: Integrated trajectory-based operations for traffic flow management in an increasingly diverse future air traffic operations. In: IEEE/AIAA Digital Avionics Systems Conference, pp. 1–9 (2019)

    Google Scholar 

  33. Guth, J., et al.: A Detailed Analysis of IoT Platform Architectures: Concepts, Similarities, and Differences. In: Di Martino, B., Li, K., Yang, L., Esposito, A. (eds.) Internet of Everything, pp. 81–101, Springer, Singapore (2018)

    Google Scholar 

  34. Hoeper, K., Gong, G.: Pre-authentication and authentication models in Ad Hoc networks. In: **ao, Y., Shen, X., Du, D. (eds.) Wireless Network Security, Signals and Communication Technology, Springer, Berlin, pp. 65–82 (2002)

    Google Scholar 

  35. Trung, S.D.: On Trustworthiness Recommendation. PhD thesis, FernUniversität in Hagen (2017)

    Google Scholar 

  36. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). Accessed 14 May 2017

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christoph Maget .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Maget, C. (2021). Vehicle Guidance System Based on Secure Mobile Communication. In: Magaia, N., Mastorakis, G., Mavromoustakis, C., Pallis, E., Markakis, E.K. (eds) Intelligent Technologies for Internet of Vehicles. Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-030-76493-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-76493-7_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-76492-0

  • Online ISBN: 978-3-030-76493-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation