Abstract

Authentication is an important guarantee for vehicle to everything (V2X) commercial deployment. Currently, V2X security often use identity authentication schemes based on public key infrastructure (PKI). These schemes need to transmit certificates and signatures when sending safety-related information such as basic safety messages (BSMs), which need to occupy extra bandwidth and reduce the available channel capacity. So, V2X communication efficiency will be seriously affected in traffic congestion. In this paper, we propose a V2X authentication model based on physical layer characteristics. Then we use the Kalman filter to refine the iterative model and threshold model. The iterative model mainly realizes the priori and posteriori estimation of the current time based on the physical layer characteristics of the previous time, which provides the basis for the entire authentication process. The threshold model analyzes the mathematical characteristics of the priori estimation, and gives the calculation method of the authentication threshold. Since the conventional Kalman filter can only be used for linear discrete system, we use extended Kalman filter and unscented Kalman filter to extend the characteristics used for authentication to non-linearity. At the same time, iterative model and threshold model are improved according to these two algorithms. In terms of security and performance, we compare the proposed schemes with the conventional V2X authentication scheme and physical layer authentication scheme, and the effects of these schemes are analyzed by experiment. We select three characteristics for simulation: received signal strength indication (RSSI), the distance between the two vehicles, and the relative speed between the two vehicles. Then we analyze the process and effect of these two filters, and the factors that affect the threshold. Through experiments, the proposed authentication schemes can effectively take the responsibility of identity authentication in the V2X environment, and have high security level and low overhead, which can reduce the consumption of communication resources by security.

Highlights

  • The vehicle to everything uses the latest generation of information and communication technology to realize omnidirectional vehicle to vehicle(V2V), vehicle to infrastructure (V2I), vehicle to pedestrian (V2P), and vehicle to network/cloud(V2N/V2C) network connections

  • 3) Since the conventional Kalman filter can only be used for linear discrete system, we introduced extended Kalman filter and unscented Kalman filter to extend the physical characteristics to non-linearity

  • We summarize the process of V2X physical layer authentication scheme based on extended Kalman filter as follows: 1) In the initialization phase, the authentication is completed using certificates and signatures

Read more

Summary

INTRODUCTION

The vehicle to everything uses the latest generation of information and communication technology to realize omnidirectional vehicle to vehicle(V2V), vehicle to infrastructure (V2I), vehicle to pedestrian (V2P), and vehicle to network/cloud(V2N/V2C) network connections. Physical layer authentication uses characteristics such as inherent attributes of communication devices or channel characteristics to identify different vehicles These characteristics are difficult to be imitated by malicious attackers, effectively guaranteeing the security of V2X communication. The use of physical layer authentication does not require additional security information, increasing the available capacity of the channel. We analyze the processes and effects of extended Kalman filter and unscented Kalman filter, the authentication process and its effects, and the factors that affect the threshold It can be seen from the experiments that our proposed authentication scheme can effectively take the responsibility of identity authentication in the V2X environment, and have high security level and low overhead, which can reduce the consumption of communication resources by security.

RELATED WORK
THRESHOLD MODEL
AUTHENTICATION SCHEMES BASED ON NONLINEAR KALMAN FILTER
AUTHENTICATION SCHEMES BASED ON EXTENDED
AUTHENTICATION SCHEMES BASED ON UNSCENTED KALMAN FILTER
COMPARISON AND ANALYSIS
EXPERIMENTAL RESULTS
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.