Long Yin, Jian Xu, Zihao Wang, Qiang Wang, Fucai Zhou
{"title":"A semi-centralized key agreement protocol integrated multiple security communication techniques for LLM-based autonomous driving system","authors":"Long Yin, Jian Xu, Zihao Wang, Qiang Wang, Fucai Zhou","doi":"10.1016/j.jisa.2025.104012","DOIUrl":null,"url":null,"abstract":"<div><div>Integrating large language models (LLMs) into autonomous vehicles facilitates AI-driven interactions for vehicle operations, yet it also introduces vulnerabilities to cyberattacks. Existing session key agreement schemes encounter significant challenges, including key leakage, single points of failure, and resource constraints. To address these limitations, we propose a semi-centralized key agreement protocol tailored for LLM-based autonomous driving systems. The protocol incorporates physical unclonable functions (PUFs) for electronic control unit (ECU) authentication, certificateless public key cryptosystems (CL-PKC) for key pair generation, Shamir’s secret sharing for group session key negotiation, and interarrival time-based covert channels with hash key chains for secure communication. Security analysis conducted using the random oracle model and the AVISPA simulation tool verifies the protocol’s security and consistency properties. Experimental evaluations demonstrate that the proposed protocol achieves reduced communication and computational overhead while exhibiting strong resilience against in-vehicle cyberattacks. These findings establish the protocol as a lightweight and robust solution for securing LLM-based autonomous driving environments.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"90 ","pages":"Article 104012"},"PeriodicalIF":3.8000,"publicationDate":"2025-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S221421262500050X","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Integrating large language models (LLMs) into autonomous vehicles facilitates AI-driven interactions for vehicle operations, yet it also introduces vulnerabilities to cyberattacks. Existing session key agreement schemes encounter significant challenges, including key leakage, single points of failure, and resource constraints. To address these limitations, we propose a semi-centralized key agreement protocol tailored for LLM-based autonomous driving systems. The protocol incorporates physical unclonable functions (PUFs) for electronic control unit (ECU) authentication, certificateless public key cryptosystems (CL-PKC) for key pair generation, Shamir’s secret sharing for group session key negotiation, and interarrival time-based covert channels with hash key chains for secure communication. Security analysis conducted using the random oracle model and the AVISPA simulation tool verifies the protocol’s security and consistency properties. Experimental evaluations demonstrate that the proposed protocol achieves reduced communication and computational overhead while exhibiting strong resilience against in-vehicle cyberattacks. These findings establish the protocol as a lightweight and robust solution for securing LLM-based autonomous driving environments.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.