Key Spreading Mutual Validation Scheme For Privacy Protection In Intelligent Transport Systems

Abstract

newline The recent emergence of the Intelligent Transport System (ITS) environment newlinehas drastically altered everyone s opinion of infrastructure, architectures, software newlinedelivery, and development models. In the present day, the ITS environment provides a newlinenumber of services, leading to many intelligent transport environments existing on a newlinesingle platform for various applications and services, often utilizing insecure newlinecommunication channels. With security concerns at the forefront, every service user newlinenow seeks robust authentic key distribution and mutual authentication within the newlinetransport environment. newlineThe ITS environment must ensure timely interaction without relying on clock newlinesynchronization, protect against man-in-the-middle attacks, and establish the newlineresponsibility of a trusted third party. Security within the ITS environment demands a newlinesystematic perspective, wherein security is built upon trust and aims to mitigate risks newlineby leveraging a trusted third party. The ITS environment is increasingly embracing newlinethe concept of a trusted third party for key distribution and mutual authentication, as newlinethe benefits outweigh its shortcomings. This thesis identifies the disadvantages of the newlineNeedham-Schroder and Otway-Rees protocols in communication networks and newlineproposes an efficient key distribution and mutual authentication mechanism. This newlineproposed mechanism involves modifications to the Needham-Schroder and Otway- newlineRees protocols, resulting in better runtime efficiency compared to the Otway and Rees newlineprotocol within the ITS environment. newlineThe proposed Modified Needham-Schroder and Otway-Rees (MNSOR) newlineprotocol in this thesis overcomes the possibility of a man-in-the-middle attack, which newlinearises due to the lack of authentication in the key distribution process of Otway and newlineRees. It achieves mutual authentication and efficient key distribution throughout the newlinecommunication in the ITS environment. Timestamps are not required in the proposed newlineMNSOR protocol, making it easily implementable in Intelligent Transport newlineenvironments where

Description

Keywords

Citation

item.page.endorsement

item.page.review

item.page.supplemented

item.page.referenced