Abstract
Cooperative Intelligent Transportation Systems (C-ITS) improve driving experience and safety through secure Vehicular Ad-hoc NETworks (VANETs) that satisfy strict security and performance constraints. Relevant standards, such as the IEEE 1609.2, prescribe network-efficient cryptographic protocols to reduce communication latencies through a combination of the Elliptic Curve Qu-Vanstone (ECQV) implicit certificate scheme and the Elliptic Curve Digital Signature Algorithm (ECDSA). However, literature lacks open implementations and performance evaluations for vehicular systems. This paper assesses the applicability of IEEE 1609.2 and of ECQV and ECDSA schemes to C-ITSs. We release an open implementation of the standard ECQV scheme to benchmark its execution time on automotive-grade boards. Moreover, we evaluate its performance in real road and traffic scenarios and show that compliance with strict latency requirements defined for C-ITS requires computational resources that are not met by many automotive-grade embedded hardware platforms. As a final contribution, we propose and evaluate novel heuristics to reduce the number of signatures to be verified in real C-ITS scenarios.
Highlights
Cooperative Intelligent Transportation Systems (C-ITS) [33] improve the driving experience by adopting communications among roadside infrastructure, road users and vehicles
This paper presents an experimental evaluation of Elliptic Curve Qu-Vanstone (ECQV) performance on automotive-grade boards for their application in Vehicular Ad-hoc NETworks (VANETs) communications
We propose an open implementation of ECQV and Elliptic Curve Digital Signature Algorithm (ECDSA) cryptographic operations, available at [37]
Summary
Cooperative Intelligent Transportation Systems (C-ITS) [33] improve the driving experience by adopting communications among roadside infrastructure, road users and vehicles. We investigate security solutions for Vehicular Ad-hoc NETworks (VANETs) and focus on the integrity and authenticity guarantees of vehicle communications To this aim, we consider the security protocols described in the IEEE 1609.2 standard defining the secure message formats for WAVE, policies for the management of the security certificates, and the supported digital signature and encryption algorithms. The realistic scenarios are built on different areas of the city of Modena (Italy) and simulated using real traffic data provided by the municipality These experiments highlight the limitations imposed by the constraints of several automotive-grade embedded platforms. The last contribution of this paper is the proposal of a prioritization strategy to improve the applicability of automotivegrade boards to real traffic scenarios.
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have