Abdulah Jarouf, N. Meskin, S. Al-Kuwari, Mohammad Shakerpour, C. Cassandras
{"title":"Security Analysis of Merging Control for Connected and Automated Vehicles","authors":"Abdulah Jarouf, N. Meskin, S. Al-Kuwari, Mohammad Shakerpour, C. Cassandras","doi":"10.1109/iv51971.2022.9827242","DOIUrl":null,"url":null,"abstract":"Securing traffic flows in internet of vehicles (IoV) environments for connected and automated vehicles (CAVs) is a critical task as it should be done in real-time to allow vehicles’ controllers engagement on time. In this paper, the security of CAV communication at merging points is studied, the insecure vehicle communication is analysed in terms of the possible security threats and consequences, and security goals are then identified to protect the environment. We present a network topology that improves the availability of the system and propose a high-level design of a vehicle authentication protocol based on public key cryptography to authenticate vehicles. Simulation and analysis of the cryptographic functions are done to choose the best fit for vehicle communication, where Rivest-Shamir-Adleman (RSA)-2048 algorithms provide faster and more efficient computations.","PeriodicalId":184622,"journal":{"name":"2022 IEEE Intelligent Vehicles Symposium (IV)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Intelligent Vehicles Symposium (IV)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iv51971.2022.9827242","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Securing traffic flows in internet of vehicles (IoV) environments for connected and automated vehicles (CAVs) is a critical task as it should be done in real-time to allow vehicles’ controllers engagement on time. In this paper, the security of CAV communication at merging points is studied, the insecure vehicle communication is analysed in terms of the possible security threats and consequences, and security goals are then identified to protect the environment. We present a network topology that improves the availability of the system and propose a high-level design of a vehicle authentication protocol based on public key cryptography to authenticate vehicles. Simulation and analysis of the cryptographic functions are done to choose the best fit for vehicle communication, where Rivest-Shamir-Adleman (RSA)-2048 algorithms provide faster and more efficient computations.