閱讀全文 | |
篇名 |
Secure Routing for WSN-Based Tactical-Level Intelligent Transportation Systems
|
---|---|
並列篇名 | Secure Routing for WSN-Based Tactical-Level Intelligent Transportation Systems |
作者 | Der-Chen Huang、Ying-Yi Chu、Yuan-Kwei Tzeng、Yu-Yi Chen、Wei-Ming Chen |
英文摘要 | Wireless sensor network (WSN) is gaining popularity in recent years due to the advantages of the WSN such as mobility, flexibility and low power consumption. Therefore, the usage of WSN in tactical-level Intelligent Transportation Systems (ITS) is expected to be able to overcome restrictions that the conventional ITS can only detect the vehicle in fixed position and high cost of construction and maintenance. Thanks to highly dynamic nodes to forward the network packets to the destinations, WSN is particularly vulnerable to attacks of interception and flooding, forging and tampering packets. Accordingly, reliable communication between nodes is dependent on the mechanism to verify the network traffic authenticity and communicating peers identity. In this paper, we propose a Zero Knowledge Key Exchange (ZKKE) scheme to setup a lightweight and adaptive hop to hop zero knowledge authentication chain (ZKAC). We adopt the GNY cryptographic protocol to prove the correctness of ZKKE and ZKAC. Based on computational cheap hash function and public-key scheme without trust third party (TTP), ZKAC enables hop-to-hop as well as end-to-end integrity protection for both routing and transformation informations in the WSN-based tactical-level ITS. |
起訖頁 | 1013-1026 |
關鍵詞 | Intelligent Transportation System (ITS)、Integrity protection、Hash chain |
刊名 | 網際網路技術學刊 |
期數 | 201907 (20:4期) |
出版單位 | 台灣學術網路管理委員會 |
DOI |
|
QR Code | |
該期刊 上一篇
| An Architecture-Centric Development Approach for Service-Oriented Product Lines |
該期刊 下一篇
| Novel Attack Tree Analysis Scheme to Assess the Security Risks on the Cloud Platform |