TY - GEN
T1 - A data security protocol for the Trusted Truck® system
AU - Bulusu, S. A.
AU - Arazi, B.
AU - Arel, I.
AU - Davis, A.
AU - Bitar, G.
PY - 2010/11/22
Y1 - 2010/11/22
N2 - Security has become one of the major concerns in the context of Intelligent Transportation Systems (ITS). The Trusted Truck® system provides an efficient wireless communication mechanism for safe exchange of messages between moving vehicles (trucks) and roadside inspection stations. Vehicles and station are equipped with processing units but with different computational capabilities. To render data exchange in Trusted Truck® more secure, this paper proposes a secured data protocol which ensures data integrity, message authentication and non-repudiation. The uniqueness of the protocol is that it effectively exploits the asymmetry of computational resources. It is cost-effective, resource-efficient and is embedded within the Trusted Truck® environment without demanding any additional hardware infrastructure. The protocol balances the computational load between vehicles and stations by incorporating an innovative key transport mechanism. Digital signatures and encryption techniques are utilized for authentication and data confidentiality. Cryptography algorithms along with optimization methods are used for digital signatures. The execution time of the algorithms is analyzed along with clear demonstration of the benefits offered by the proposed scheme.
AB - Security has become one of the major concerns in the context of Intelligent Transportation Systems (ITS). The Trusted Truck® system provides an efficient wireless communication mechanism for safe exchange of messages between moving vehicles (trucks) and roadside inspection stations. Vehicles and station are equipped with processing units but with different computational capabilities. To render data exchange in Trusted Truck® more secure, this paper proposes a secured data protocol which ensures data integrity, message authentication and non-repudiation. The uniqueness of the protocol is that it effectively exploits the asymmetry of computational resources. It is cost-effective, resource-efficient and is embedded within the Trusted Truck® environment without demanding any additional hardware infrastructure. The protocol balances the computational load between vehicles and stations by incorporating an innovative key transport mechanism. Digital signatures and encryption techniques are utilized for authentication and data confidentiality. Cryptography algorithms along with optimization methods are used for digital signatures. The execution time of the algorithms is analyzed along with clear demonstration of the benefits offered by the proposed scheme.
KW - key-transport mechanism
KW - public-key cryptography
KW - secured data protocol
KW - Trusted Truck® system
UR - http://www.scopus.com/inward/record.url?scp=78349261231&partnerID=8YFLogxK
U2 - 10.1145/1852666.1852707
DO - 10.1145/1852666.1852707
M3 - Conference contribution
AN - SCOPUS:78349261231
SN - 9781450300179
T3 - ACM International Conference Proceeding Series
BT - 6th Annual Cyber Security and Information Intelligence Research Workshop
T2 - 6th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW10
Y2 - 21 April 2010 through 23 April 2010
ER -