Advanced SearchSearch Tips
Design and Implementation of Secure Vehicle Communication Protocols for WAVE Communication Systems
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Design and Implementation of Secure Vehicle Communication Protocols for WAVE Communication Systems
Park, Seung-Peom; Ahn, Jae-Won; Kim, Eun-Gi;
  PDF(new window)
The WAVE(Wireless Access in Vehicular Environments) communication system supports wireless communication environments between vehicles. As the utilization of wireless communication has been increased, attack methods have been varied. There is a high risk on packet manipulations conducted by third party. In this paper, we have designed a secure communication protocol between CA and vehicles. Our designed protocol uses a ECIES(Elliptic Curve Integrated Encryption Scheme) for vehicle authentication and AES(Advanced Encryption Standard) algorithm for protecting packet integrity and confidentiality.
 Cited by
WAVE Communication-based V2I Channel Modeling,;;;;;

한국마린엔지니어링학회지, 2016. vol.40. 10, pp.899-905 crossref(new window)
프라이버시 보호를 위한 V2V 통신 인증 서비스의 간략화,박승수;한근희;김기천;

한국사물인터넷학회논문지, 2016. vol.2. 1, pp.35-40 crossref(new window)
보안 기능을 지원하는 TELNET 프로토콜의 설계 및 구현,성정기;서혜인;김은기;

한국정보통신학회논문지, 2016. vol.20. 4, pp.769-776 crossref(new window)
Ray tracing 기반 5.9 GHz 대역 통신 채널 모델링에 관한 연구,이수환;임기택;김종찬;조형래;서동환;

한국마린엔지니어링학회지, 2017. vol.41. 9, pp.921-927 crossref(new window)
Design and implementation of TELNET protocol supporting security functionalities, Journal of the Korea Institute of Information and Communication Engineering, 2016, 20, 4, 769  crossref(new windwow)
WAVE Communication-based V2I Channel Modeling, Journal of the Korean Society of Marine Engineering, 2016, 40, 10, 899  crossref(new windwow)
A Secure and Efficient V2V Authentication Method in Heavy Traffic Environment, Wireless Personal Communications, 2017, 93, 1, 245  crossref(new windwow)
S.S. Lee, "Vehicle Communication International Standardization Trend", The Korean Institute of Communications and Information Sciences(Information & Communications Magazine), vol.29,no.2,pp. 3-10, 2012.

M.Y. Bang, I.J. Jang. ""Act on the construction of a ubiquitous city" revised direction from the point of view of the traffic information business", CEO Report 2008, No.13, pp.1-22.

S.Y. Lee, H.G. Jeong, S.H. Yoon, and K.T. Lim, "Development Trend of WAVE System for the C-ITS Communication", Korea Electronics Technology Institute.

Y.C. Lee, H.J. Seo, H.W. Kim, "The Efficient AES-CCM Architecture for a hardware library in the WAVE", Journal of the Korea Institute of Information and Communication Engineering, Vol. 17, No. 12 : 2899-2905 Dec. 2013. crossref(new window)

Behrouz A. Forouzan, Shphia Chung Fegan, "Data communications and Networking", 4rd Ed., pp.943-945, 952-954, McGraw Hill, 2007.

National Internet Development Agency of Korea activation password using the official site. Available:

C. Krishana Kumar, G. Jai Arul Jose, C. Sajeev and C.Suyambulingom, "Safety measures against man-in-the-middle attack in key exchange" ARPN Journal of Engineering and Applied Sciences, Vol. 7, No. 2, Feb 2012.

David J. Malan, Matt Welsh, Michael D. Smith, "A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography", IEEE 4-7, pp.71-80, Oct. 2004,

Dan Boneh and Igor E. Shparlinski "On the Unpredictability of Bits of the Elliptic Curve Diffie-Hellman Scheme", Lecture Notes in Computer Science Vol 2139, 2001, pp.201-212, Aug 2001.

Gavin Lowe "An attack on the Needham-Schroeder public-key authentication protocol" Information Processing Letters 56 (1995) pp.131-133. crossref(new window)

K.C Shin, "A Robust and Secure Remote User Authentication Scheme Preserving User Anonymity", Journal of the Society of Korea e-commerce Aritcle 18 No.2, Apr 2013.

Junichiro Saito, Kouichi Sakurai, "Grouping proof for RFID tags", IEEE 28-30 , pp.621-624, Vol.2, Mar 2005.

RFC 4347, Datagram Transport Layer Security, E.Rescorla, N. Modadugu, Apr 2006.

R. J. Benice, A. H. Frey, "An Analysis of Retransmission Systems", IEEE, Vol.12 pp.135-145, Jun 2003.

Zilhaz Jalal Chowdhury, Davar Pishva, G. G. D. Nishantha "AES and Confidentiality from the Inside Out", IEEE 7-10, pp.1587-1591, Vol.2, Feb 2010.