{"title":"Vehicular sensor networks Authentication new approach","authors":"H. Wen","doi":"10.1109/ICVES.2010.5550923","DOIUrl":null,"url":null,"abstract":"In this paper, we introduce a novel Physical layer Assisted message Authentication (PAA) under public key infrastructure (PKI) in vehicular communication networks. The novel authentication scheme takes advantage of temporal and spatial uniqueness in physical layer channel responses for each transmission pair, in which a trust between two vehicles can be maintained by comparing the current estimated channel response and the previous estimated channel response. We will show that the proposed message authentication scheme can achieve extremely high efficiency and minimal authentication delay without compromising the security requirements, which is further verified through both analysis and simulation.","PeriodicalId":416036,"journal":{"name":"Proceedings of 2010 IEEE International Conference on Vehicular Electronics and Safety","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of 2010 IEEE International Conference on Vehicular Electronics and Safety","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICVES.2010.5550923","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
In this paper, we introduce a novel Physical layer Assisted message Authentication (PAA) under public key infrastructure (PKI) in vehicular communication networks. The novel authentication scheme takes advantage of temporal and spatial uniqueness in physical layer channel responses for each transmission pair, in which a trust between two vehicles can be maintained by comparing the current estimated channel response and the previous estimated channel response. We will show that the proposed message authentication scheme can achieve extremely high efficiency and minimal authentication delay without compromising the security requirements, which is further verified through both analysis and simulation.