A data security protocol for the Trusted Truck® system

S. A. Bulusu, B. Arazi, I. Arel, A. Davis, G. Bitar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Security has become one of the major concerns in the context of Intelligent Transportation Systems (ITS). The Trusted Truck® system provides an efficient wireless communication mechanism for safe exchange of messages between moving vehicles (trucks) and roadside inspection stations. Vehicles and station are equipped with processing units but with different computational capabilities. To render data exchange in Trusted Truck® more secure, this paper proposes a secured data protocol which ensures data integrity, message authentication and non-repudiation. The uniqueness of the protocol is that it effectively exploits the asymmetry of computational resources. It is cost-effective, resource-efficient and is embedded within the Trusted Truck® environment without demanding any additional hardware infrastructure. The protocol balances the computational load between vehicles and stations by incorporating an innovative key transport mechanism. Digital signatures and encryption techniques are utilized for authentication and data confidentiality. Cryptography algorithms along with optimization methods are used for digital signatures. The execution time of the algorithms is analyzed along with clear demonstration of the benefits offered by the proposed scheme.

Original languageEnglish
Title of host publication6th Annual Cyber Security and Information Intelligence Research Workshop
Subtitle of host publicationCyber Security and Information Intelligence Challenges and Strategies, CSIIRW10
DOIs
StatePublished - 22 Nov 2010
Externally publishedYes
Event6th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW10 - Oak Ridge, TN, United States
Duration: 21 Apr 201023 Apr 2010

Publication series

NameACM International Conference Proceeding Series

Conference

Conference6th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW10
Country/TerritoryUnited States
CityOak Ridge, TN
Period21/04/1023/04/10

Keywords

  • key-transport mechanism
  • public-key cryptography
  • secured data protocol
  • Trusted Truck® system

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A data security protocol for the Trusted Truck® system'. Together they form a unique fingerprint.

Cite this