Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol

05/06/2021
by   Felipe Boeira, et al.
0

Vehicular networks will enable a range of novel applications to enhance road traffic efficiency, safety, and reduce fuel consumption. As for other cyber-physical systems, security is essential to the deployment of these applications and standardisation efforts are ongoing. In this paper, we perform a systematic security evaluation of a vehicular platooning protocol through a thorough analysis of the protocol and security standards. We tackle the complexity of the resulting model with a proof strategy based on a relation on keys. The key relation forms a partial order, which encapsulates both secrecy and authenticity dependencies. We show that our order-aware approach makes the verification feasible and proves strong authenticity properties along with secrecy of all keys used throughout the protocol.

READ FULL TEXT
research
12/12/2017

Security Issues in Vehicular Ad Hoc Networks (VANET): a survey

Vehicular Ad Hoc Networks (VANET) is a technology that has been recently...
research
01/17/2023

Analysis and Improvements of the Sender Keys Protocol for Group Messaging

Messaging between two parties and in the group setting has enjoyed wides...
research
09/12/2018

Distorting an Adversary's View in Cyber-Physical Systems

In Cyber-Physical Systems (CPSs), inference based on communicated data i...
research
09/24/2018

Security and Performance Considerations in ROS 2: A Balancing Act

Robot Operating System (ROS) 2 is a ground-up re-design of ROS 1 to supp...
research
09/08/2022

Security Analysis of the EDHOC protocol

Ephemeral Diffie-Hellman Over COSE (EDHOC) aims at being a very compact ...
research
07/25/2023

A Novel Computationally Efficient Group Signature for Anonymous and Secure V2X Communications

The use of vehicle-to-everything (V2X) communication is expected to sign...
research
01/16/2018

Relaxed Conditions for Secrecy in a Role-Based Specification

In this paper, we look at the property of secrecy through the growth of ...

Please sign up or login with your details

Forgot password? Click here to reset