1 / 17

Chaotic Stream Cipher-Based Secure Data Communications over Intelligent Transportation Network

Chaotic Stream Cipher-Based Secure Data Communications over Intelligent Transportation Network. Author: Wei Zhang, Shanyu Tang, Liping Zhang, Zhao Ma, and Jun Song Publisher: Hindawi Publishing Corporation International Journal of Antennas and Propagation Presenter: 柯懷貿

Audrey
Download Presentation

Chaotic Stream Cipher-Based Secure Data Communications over Intelligent Transportation Network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chaotic Stream Cipher-Based Secure Data Communications overIntelligent Transportation Network Author:Wei Zhang, Shanyu Tang, Liping Zhang, Zhao Ma, and Jun Song Publisher:Hindawi Publishing Corporation International Journal of Antennas and Propagation Presenter: 柯懷貿 Date: 2018/05/01 Department of Computer Science and Information Engineering National Cheng Kung University, Taiwan R.O.C.

  2. Introduction • Intelligent transportation systems (ITS) provide real-time, accurate, effective, and comprehensive transportation management services. • Usersof ITS including motorists, commercial operators, and publictransport customers, who rely on ITS to make travel decisions, are informed based on such factors as traffic conditions,road maintenance or construction work, and weather conditions that could potentially impact travel time and safety. • Policy makers and road or highway operators also utilize the information from ITS in the management and future planning of the road networks. National Cheng Kung University CSIE Computer & Internet Architecture Lab

  3. Intelligent transport systems • Intelligent transport systems vary in technologies applied and mainly comprise seven subsystems: electronic toll collection system (ETC), advanced transport information service (ATIS), advanced transportation management system (ATMS), advanced public transportation system (APTS), advanced vehicle control system (AVCS), freight management system (FMS), and emergence rescue system (ERS). • Electronic toll collection system has greatly improved the toll collection process by making use of transponder with RFID technology and license plate recognition system to identify vehicles and by transmitting information in relation to toll transaction over ETC network to collect the final tolls without stopping or slowing traffic. National Cheng Kung University CSIE Computer & Internet Architecture Lab

  4. Electronic Toll Collection System • ETCcomprises three parts:automatic vehicle identification (AVI) system, automatic vehicle classification (AVC) system, and violation enforcement (VE) system. • OBUis capable of collecting location information that is sent to RSU via DSRC. National Cheng Kung University CSIE Computer & Internet Architecture Lab

  5. ETC Intelligent Transportation Network • Information on tolls is transmitted over an ETC intelligent transportation network, which is regarded as a derivative of the Internet of Things. • Data communications between OBU and RSU are carried out using DSRC technology; data transmission among sensor nodes uses wireless sensor network (WSN) technique; the exchange of information between RSU and the processing centre is based on wireless local area network (WLAN) and so on. National Cheng Kung University CSIE Computer & Internet Architecture Lab

  6. Security RequirementsforWSN • The maintenance and monitoring of sensor nodes are quite difficult due to its deployment environment, and so the sensor nodes could be easily compromised by adversaries. The security of the information collected by the sensor nodes has a direct impact on the privacy of vehicle owners; thus a priority should be given to secure data communication over WSN. • Encrypting sensitive data such as vehicle information on deduction standards could effectively resist some attacks on WSN.However,the low battery power, limited memory space, and less processing capabilities of sensor nodes should be taken into account. National Cheng Kung University CSIE Computer & Internet Architecture Lab

  7. Related Work • An RSA-based asymmetric algorithm is not practical due to the limitations of sensor battery and CPU power. Furthermore, the public key algorithm with low encryption speed could not meet the real-time data transmission requirement, which is vital to WSN. • Although the existing ECC-AES scheme is pretty secure, the whole process isstill complicated and time-consuming. The increase in the elapsed time of finishing this complicated scheme has a negative effect on the quality of real-time communication. • We are devoted to improving key management and information security for WSN by proposing a more reliable, speedy, and secure cryptographic scheme. National Cheng Kung University CSIE Computer & Internet Architecture Lab

  8. Logistic Chaotic System • The logistic chaotic system is one of the most popular models for discrete nonlinear dynamical systems. Its expression and computation process are straightforward. A logistic chaotic map can be described in National Cheng Kung University CSIE Computer & Internet Architecture Lab

  9. RC4 Encryption Algorithm • RC4 is regarded as a variable key-size stream cipher based on a 256-byte secret internal state and two one-byte indexes,whichis composed of two components: key-scheduling algorithm (KSA) and pseudorandom number generation algorithm (PRGA). • KSA generates an initial permutation state 𝑆. PRGA is a repeated loop procedure with each loop generating a one-byte pseudorandom output as a key streamand XORedwith one-byte of plaintext,whileupdating 𝑆. National Cheng Kung University CSIE Computer & Internet Architecture Lab

  10. Logistic Chaotic RC4 Algorithm • The primary method of enhancing the anti-attack ability of RC4 is to improve the complexity and randomicityof key sequences by embedding a logistic chaotic system into the PRSA. • The proposed chaotic stream cipher-based cryptographic scheme includes four stages: regional division, the initialization of sensor nodes, the creation of session key and data encryption, and key updating. National Cheng Kung University CSIE Computer & Internet Architecture Lab

  11. Regional Division • It needs to pick up an appropriate divisionforconnecting seamlessly and covering the whole WSN area.Therefore,followingresultshouldbeaninteger: where 𝑛represents the number of edges in a polygon. • Assuming that the base station is an unconditionally trusted entity,the base station sends flooding broadcast to the whole WSN and then collects the information including the number and location of sensor nodes. Subsequently, the base station divides the WSN area in the form of regular hexagon, in which 𝐶𝐻, 𝐶𝑀, and 𝐶𝐴 represent the cluster head, member node, and critical node, respectively National Cheng Kung University CSIE Computer & Internet Architecture Lab

  12. Initialization of Sensor Nodes • The initialization processes vary for different types of wireless sensor nodes. • 𝐶𝐻 is the cluster head of every partition, which is used to manage the whole non-𝐶𝐻 sensor nodes within a partition. 𝐶𝐻 has the identity id𝑥 assigned by the base stationandtwo sets of keys {𝑥𝐵, 𝜇𝐵}, {𝑥𝑅, 𝜇𝑅}sharedwithbasestationandnon-𝐶𝐻 sensor nodes, respectively. • 𝐶𝐴 hasthree adjacent domains at the mostandneeds to prestore two or three pairs of keys {𝑥𝑅, 𝜇𝑅} shared with every adjacent domain. • 𝐶𝑀 isa general member sensor node that only prestoresa pair of keys. National Cheng Kung University CSIE Computer & Internet Architecture Lab

  13. Creation of Session Key and Data Encryption • If 𝐴and 𝐵 are in the same partition,they can negotiate a session key directly.Otherwise,the creation of session key depends on the 𝐶𝐴 as a medium. • Sensor node 𝐴 sends a random number 𝑟𝑎 to sensor node 𝐵, when receiving 𝑟𝑎 from 𝐴, 𝐵 transmits a random number 𝑟𝑏 to 𝐴. • Forupdatingkey, 𝐶𝐻 sendsa random number 𝑟aand itslegal identity id𝑥 tothebasestationfirst. National Cheng Kung University CSIE Computer & Internet Architecture Lab

  14. Key Updating • Next, 𝐶𝐻 shoulddecidetheupdatingof{𝑥𝐵, 𝜇𝐵}, {𝑥𝑅, 𝜇𝑅}andreceive 𝑟bfromthebasestationforusingthe proposed scheme totransmitnewkeys. • If the update keys are{𝑥𝑁𝑅, 𝜇𝑁𝑅}, 𝐶𝐻 also needs to send it to all non-𝐶𝐻 sensor nodes in its partition. • 𝐶𝐻 first sends flooding broadcasts carrying a random number 𝑟𝐶𝐻 to other sensor nodes in the same partition.The random number 𝑟𝐶𝐻 acts as the functions of 𝑟𝑎 and 𝑟𝑏. Subsequently, 𝐶𝐻 transmits the new key {𝑥𝑁𝑅, 𝜇𝑁𝑅} after the process by using the proposed scheme in the stage of the creation of session key and data encryption. National Cheng Kung University CSIE Computer & Internet Architecture Lab

  15. Security Analysis • Dos attacks aimed at the base stationareavoidedbecauseof 𝐶𝐻 in charge ofcommunication. • The proposed scheme can resist interference attacks, because the statistical nature of the key sequence generated by the use of logistic chaotic system is similar to the white noise’s possessing anti-interference. • The proposed scheme can resist replayandman-in-the-middle attacksaimed atrandomnumber since the adversary does not possess the shared key {𝑥𝑅, 𝜇𝑅}. • Ifa wireless sensor node wants to transmit vehicle, it can obtain a session key sequence by using the proposed scheme, which is fairly secure. National Cheng Kung University CSIE Computer & Internet Architecture Lab

  16. Experimental Results and Discussion • We measured the elapsed times of session key negotiation and data encryption using the proposed scheme and then compared the experimental results with the results obtained from the experiments using the existing ECC AES scheme with the OpenSSL cryptographic library. • For comparing the elapsed times, the two schemes encrypted information with the same length. With regard to the elapsed time of finishing one round session key creation and data encryption. National Cheng Kung University CSIE Computer & Internet Architecture Lab

  17. Experimental Results and Discussion • After 40 times repeated tests, we obtained the elapsed times of finishing one round session key creation anddata encryption for the proposed scheme and the existing ECC-AES scheme, respectively, and the results are listed in Table 1. National Cheng Kung University CSIE Computer & Internet Architecture Lab

More Related