Key Spreading Mutual Validation Scheme For Privacy Protection In Intelligent Transport Systems
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
newline The recent emergence of the Intelligent Transport System (ITS) environment
newlinehas drastically altered everyone s opinion of infrastructure, architectures, software
newlinedelivery, and development models. In the present day, the ITS environment provides a
newlinenumber of services, leading to many intelligent transport environments existing on a
newlinesingle platform for various applications and services, often utilizing insecure
newlinecommunication channels. With security concerns at the forefront, every service user
newlinenow seeks robust authentic key distribution and mutual authentication within the
newlinetransport environment.
newlineThe ITS environment must ensure timely interaction without relying on clock
newlinesynchronization, protect against man-in-the-middle attacks, and establish the
newlineresponsibility of a trusted third party. Security within the ITS environment demands a
newlinesystematic perspective, wherein security is built upon trust and aims to mitigate risks
newlineby leveraging a trusted third party. The ITS environment is increasingly embracing
newlinethe concept of a trusted third party for key distribution and mutual authentication, as
newlinethe benefits outweigh its shortcomings. This thesis identifies the disadvantages of the
newlineNeedham-Schroder and Otway-Rees protocols in communication networks and
newlineproposes an efficient key distribution and mutual authentication mechanism. This
newlineproposed mechanism involves modifications to the Needham-Schroder and Otway-
newlineRees protocols, resulting in better runtime efficiency compared to the Otway and Rees
newlineprotocol within the ITS environment.
newlineThe proposed Modified Needham-Schroder and Otway-Rees (MNSOR)
newlineprotocol in this thesis overcomes the possibility of a man-in-the-middle attack, which
newlinearises due to the lack of authentication in the key distribution process of Otway and
newlineRees. It achieves mutual authentication and efficient key distribution throughout the
newlinecommunication in the ITS environment. Timestamps are not required in the proposed
newlineMNSOR protocol, making it easily implementable in Intelligent Transport
newlineenvironments where