Abstract
Vehicle guidance systems are considered key to improve capacity and safety of transport systems. Information and communication technologies enable both vehicle speeds and distances to be optimized without being limited to human reaction times. As the major two competing topological approaches for communication networks, viz. ad-hoc and cellular networks, exhibit specific advantages and disadvantages in different applications, there is still no standardized solution in the offing. Established encryption methods have either proven to be insecure or lack real-time capabilities when used in distributed automation systems, where the only proven secure concept for encryption – perfect security – has not been employed so far due to practical shortcomings. Meeting existing standards, a communication architecture for vehicle guidance systems allowing for perfectly secure encryption and observing real-time requirements for wireless communication is presented. Its core components are a central instance authenticating all participants, generating and distributing the required keys as well as a transmission infrastructure based on relay stations. Different sensitivity analyses show that one-time pad cryptography can keep up with or even outperform the AES in the presented use case. The keys required for a sufficiently long operating time can be stored on common storage media.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Integrity check required.
- 2.
With 1 MiB = 1024 KiB = 1024 \(\times \) 1024 B, 1 B=8 bit.
- 3.
With 1 MiB = 1024 KiB = 1024 \(\times \) 1024 B, 1 B=8 bit.
- 4.
With 1 GiB = 1024 MiB = 1024 \(\times \) 1024 KiB = 1024 \(\times \) 1024 \(\times \) 1024 B, 1 B=8 bit.
- 5.
Intel(R) Core(TM) i7-4510U CPU @ 2.00 GHz, 8 GB RAM, 64-bit operating system, Python 3.8.3, pycryptodome 3.9.7, pandas 1.0.3.
References
Directive 2010/40/EU of the European Parliament and of the Council (2010)
Williams, B.: Intelligent Transport Systems Standards. Artech House, Boston (2008)
DIN SPEC 91345:2016-04, Reference Architecture Model Industry 4.0 (RAMI4.0). Beuth Verlag, Berlin (2016)
Sommer, C., Dressler, F.: Vehicular Networking. Cambridge University Press, Cambridge (2015)
SAE J 3016:2018-06-15, Taxonomy and Definitions for Terms Related to Driving Automation Systems for On-Road Motor Vehicles. Beuth Verlag, Berlin (2018)
Bagloee, S., Tavana, M., Asadi, M.: et al.: Autonomous vehicles: challenges, opportunities, and future implications for transportation policies. J. Mod. Transp. 24, 284–303 (2016)
Tahir, M.N., Mäenpää, K., Sukuvaara, T.: Evolving wireless vehicular communication system level comparison and analysis of 802.11p, 4G, 5G. In: International Conference on Communication, Computing and Digital systems (C-CODE), pp. 48–52 (2019)
Medhi, D., Ramasamy, K.: Network Routing: Algorithms, Protocols, and Architectures. Morgan Kaufmann, Cambridge (2017)
Soyata, T: Enabling Real-Time Mobile Cloud Computing Through Emerging Technologies. IGI Global, Hershey (2015)
Oorni, R., Goulart, A.: In-vehicle emergency call services: eCall and beyond. IEEE Commun. Mag. 55(1), 159–165 (2017)
Kim, S., Noh, W., An, S.: Multi-path ad hoc routing considering path redundancy. In: Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003, vol. 1, pp. 45–50 (2003)
Jiang, D., Delgrossi, L.: IEEE 802.11p: towards an international standard for wireless access in vehicular environments. In: IEEE Vehicular Technology Conference, pp. 2036–2040. IEEE (2008)
Paar, C., Pelzl, J.: Understanding Cryptography. Springer-Verlag, Berlin (2010)
Electronic Frontier Foundation: Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design. O’Reilly (1998)
Kalenderi, M., Pnevmatikatos, D., Papaefstathiou, I., Manifavas, C.: Breaking the GSM A5/1 cryptography algorithm with rainbow tables and high-end FPGAs. In: International Conference on Field Programmable Logic and Applications, pp. 747–753 (2012)
Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Technical report, Massachusetts Institute of Technology (1977) Accessed 07 Jul 2019
Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theor. 31(4), 469–472 (1985)
Hasrouny, H., Samhat, A., Bassil, C., Laouiti, A.: VANet security challenges and solutions: a survey. Veh. Commun. 7, 7–20 (2017)
Shannon, C.: Communication Theory of Secrecy Systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)
ETSI EN 302 637-2, Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service Online (2019). Accessed 02 Jan 2020
ETSI EN 302 637-3, Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 3: Specifications of Decentralized Environmental Notification Basic Service (2019). Accessed 02 Jan 2020
Khattak, H., Farman, H., Jan, B., Din, I.: Toward integrating vehicular clouds with IoT for smart city services. IEEE Netw. 33(2), 65–71 (2019)
Mundhenk, P., et al.: Security in automotive networks: Lightweight authentication and authorization. ACM Trans. Des. Autom. Electron. Syst. 22(2), 1–27 (2017)
Bittl, S., et al.: Emerging attacks on VANET security based on GPS time spoofing. In: 2015 IEEE Conference on Communications and Network Security (CNS), pp. 344–352 (2015)
Levinson, J., et al.: Towards fully autonomous driving: Systems and algorithms. In: 2011 IEEE Intelligent Vehicles Symposium (IV), pp. 163–168 (2011)
Hartenstein, H., Laberteaux, K.: VANET: Vehicular Applications and Inter-Networking Technologies. Wiley, Chichester (2010)
Lee, J., Kim, C.: A roadside unit placement scheme for vehicular telematics networks. In: Kim, T., Adeli, H. (eds.) Advances in Computer Science and Information Technology, Springer-Verlag, Berlin, pp. 196–202 (2010)
Vernam, G.: Secret Signaling System. Patent US 1310719 A (1919)
Statista, de.statista.com (2020). Accessed 12 Sep 2020
Rotem-Gal-Oz, A.: Fallacies of Distributed Computing Explained, Technical Report, Sun Microsystems (1997). Accessed 20 Jul 2020
Kumar, S., Verma, A.: Position based routing protocols in VANET: a survey. Wireless Pers. Commun. 83, 2747–2772 (2015)
Lee, P.U., Idris, H., Helton, D., Davis, T., Lohr, G., Oseguera-Lohr, R.: Integrated trajectory-based operations for traffic flow management in an increasingly diverse future air traffic operations. In: IEEE/AIAA Digital Avionics Systems Conference, pp. 1–9 (2019)
Guth, J., et al.: A Detailed Analysis of IoT Platform Architectures: Concepts, Similarities, and Differences. In: Di Martino, B., Li, K., Yang, L., Esposito, A. (eds.) Internet of Everything, pp. 81–101, Springer, Singapore (2018)
Hoeper, K., Gong, G.: Pre-authentication and authentication models in Ad Hoc networks. In: **ao, Y., Shen, X., Du, D. (eds.) Wireless Network Security, Signals and Communication Technology, Springer, Berlin, pp. 65–82 (2002)
Trung, S.D.: On Trustworthiness Recommendation. PhD thesis, FernUniversität in Hagen (2017)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). Accessed 14 May 2017
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Maget, C. (2021). Vehicle Guidance System Based on Secure Mobile Communication. In: Magaia, N., Mastorakis, G., Mavromoustakis, C., Pallis, E., Markakis, E.K. (eds) Intelligent Technologies for Internet of Vehicles. Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-030-76493-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-76493-7_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-76492-0
Online ISBN: 978-3-030-76493-7
eBook Packages: Computer ScienceComputer Science (R0)