Performance Analysis of Security Certificate Management System in
Vehicle-to-Everything (V2X)
- URL: http://arxiv.org/abs/2311.03360v1
- Date: Mon, 18 Sep 2023 02:24:33 GMT
- Title: Performance Analysis of Security Certificate Management System in
Vehicle-to-Everything (V2X)
- Authors: Abel C. H. Chen, Cheng-Kang Liu, Chun-Feng Lin, Bon-Yeh Lin
- Abstract summary: This study implements end entities and a Security Credential Management System conforming to IEEE 1609.2 and IEEE 1609.2.1 standards.
It measures the computation and transmission times for each security communication action within the system from the perspective of end entities.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In Vehicle-to-Everything (V2X) communications, providing accurate information
and safeguarding the privacy of end entities is one of the crucial information
security issues. Therefore, several international standardization organizations
have begun to develop V2X communication security standards in recent years. For
instance, the IEEE 1609.2.1 standard designs a Security Credential Management
System (SCMS) that specifies certificate application and issuance processes, as
well as certificate revocation processes. Furthermore, the IEEE 1609.2 standard
defines certificate formats and Secure Protocol Data Units (SPDUs) for secure
data transmission based on these standards. As a result, end entity
manufacturers and SCMS providers worldwide have started building V2X security
systems in accordance with these standards and conducting interoperability
testing. Although international standards mainly employ Elliptic-Curve
Cryptography (ECC) for signature/verification and encryption/decryption
functions, performance analysis remains a crucial issue for the practical
deployment of these systems. Therefore, this study implements end entities and
a SCMS conforming to IEEE 1609.2 and IEEE 1609.2.1 standards. It measures the
computation and transmission times for each security communication action
within the system from the perspective of end entities and identifies potential
system bottlenecks. In the experimental results, this study analyzes the most
performance-intensive actions and provides relevant suggestions for enhancing
system efficiency for SCMS developers to reference.
Related papers
- An Efficient TLS 1.3 Handshake Protocol with VC Certificate Type [0.0]
The paper presents a step forward in the design and implementation of a Transport Layer Security (TLS) handshake protocol.
It enables the use of Verifiable Credential (VC) while maintaining full compliance with RFC-8446 and preserving all the security features of TLS 1.3.
Results pave the way for the adoption of Self-Sovereign Identity in large-scale Internet of Things (IoT) systems.
arXiv Detail & Related papers (2024-07-17T13:18:16Z) - Enhancing Energy Sector Resilience: Integrating Security by Design Principles [20.817229569050532]
Security by design (Sbd) is a concept for developing and maintaining systems that are impervious to security attacks.
This document presents the security requirements for the implementation of the SbD in industrial control systems.
arXiv Detail & Related papers (2024-02-18T11:04:22Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - HasTEE+ : Confidential Cloud Computing and Analytics with Haskell [50.994023665559496]
Confidential computing enables the protection of confidential code and data in a co-tenanted cloud deployment using specialized hardware isolation units called Trusted Execution Environments (TEEs)
TEEs offer low-level C/C++-based toolchains that are susceptible to inherent memory safety vulnerabilities and lack language constructs to monitor explicit and implicit information-flow leaks.
We address the above with HasTEE+, a domain-specific language (cla) embedded in Haskell that enables programming TEEs in a high-level language with strong type-safety.
arXiv Detail & Related papers (2024-01-17T00:56:23Z) - A Holistic Approach for Trustworthy Distributed Systems with WebAssembly and TEEs [2.0198678236144474]
This paper introduces a novel approach using WebAssembly to address these issues.
We present the design of a portable and fully attested publish/subscribe system as a holistic approach.
Our experimental results showcase most overheads, revealing a 1.55x decrease in message throughput when using a trusted broker.
arXiv Detail & Related papers (2023-12-01T16:37:48Z) - Qualitative Analysis for Validating IEC 62443-4-2 Requirements in
DevSecOps [0.8874671354802572]
This paper focuses on the automated validation of ISA/ IEC 62443-4-2 standard component requirements.
Our analysis demonstrates the coverage established by the currently available tools and sheds light on current gaps to achieve full automation.
arXiv Detail & Related papers (2023-10-13T10:24:58Z) - Evaluation and Analysis of Standard Security Technology in V2X Communication -- Exploring ECQV Implicit Certificate Cracking [0.0]
This study evaluates the computational time for key generation, key expansion, signature generation, and signature verification under different security strengths.
This study proposes mathematical models to demonstrate the probability of ECQV cracking and provides suggestions for mitigating ECQV cracking risks.
arXiv Detail & Related papers (2023-09-27T01:13:24Z) - A General Framework for Verification and Control of Dynamical Models via Certificate Synthesis [54.959571890098786]
We provide a framework to encode system specifications and define corresponding certificates.
We present an automated approach to formally synthesise controllers and certificates.
Our approach contributes to the broad field of safe learning for control, exploiting the flexibility of neural networks.
arXiv Detail & Related papers (2023-09-12T09:37:26Z) - Leveraging Traceability to Integrate Safety Analysis Artifacts into the
Software Development Process [51.42800587382228]
Safety assurance cases (SACs) can be challenging to maintain during system evolution.
We propose a solution that leverages software traceability to connect relevant system artifacts to safety analysis models.
We elicit design rationales for system changes to help safety stakeholders analyze the impact of system changes on safety.
arXiv Detail & Related papers (2023-07-14T16:03:27Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - A Survey of Secure Computation Using Trusted Execution Environments [80.58996305474842]
This article provides a systematic review and comparison of TEE-based secure computation protocols.
We first propose a taxonomy that classifies secure computation protocols into three major categories, namely secure outsourced computation, secure distributed computation and secure multi-party computation.
Based on these criteria, we review, discuss and compare the state-of-the-art TEE-based secure computation protocols for both general-purpose computation functions and special-purpose ones.
arXiv Detail & Related papers (2023-02-23T16:33:56Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.