• Previous Article
    Designing dynamical systems for security and defence network knowledge management. A case of study: Airport bird control falconers organizations
  • DCDS-S Home
  • This Issue
  • Next Article
    Characteristic analysis of carrier based on the filtering and a multi-wavelet method for the information hiding
December  2015, 8(6): 1301-1309. doi: 10.3934/dcdss.2015.8.1301

The application of improved-DAA for the vehicle network node security in single- and multi-trusted domain

1. 

School of Information Engineering, Chang'an University, Xi'an, Shaanxi 710064, China

2. 

School of Electronic and Control Engineering, Chang'an University, Xi'an, Shaanxi 710064

3. 

School of Information Engineering, Xizang Minzu University, Xianyang, Shaanxi 712082

Received  May 2015 Revised  September 2015 Published  December 2015

Similar to network, vehicle-mounted system has its own vulnerability, which can be used by the attackers. Different from the traditional network security technologies, node security is one of the most important technologies of the vehicle network and it is difficult to achieve because of the mobility and flexibility. In this paper, trusted computing and direct anonymous attestation theories are adopted to establish protocol system of trusted vehicle information authentication, thus the security of authentication process for nodes in vehicle network can be improved. First, we use DAA to achieve the identity authentication for the accessor in single-trusted domain. Second, the improved-DAA will be used to try to promote the security situation in multi-trusted domain. It is illustrated that the efficiency of verification can be increased and the possibility of being attacked can be decreased in single-trusted domain. And the execution efficiency in multi-trusted domain can be improved theoretically.
Citation: Shuai Ren, Tao Zhang, Fangxia Shi, Zongzong Lou. The application of improved-DAA for the vehicle network node security in single- and multi-trusted domain. Discrete and Continuous Dynamical Systems - S, 2015, 8 (6) : 1301-1309. doi: 10.3934/dcdss.2015.8.1301
References:
[1]

S. Astapov and A. Riid, A multistage procedure of mobile vehicle acoustic identification for single-sensor embedded device, International Journal of Electronics and Telecommunications, 59 (2013), 151-160. doi: 10.2478/eletel-2013-0018.

[2]

E. Brickell and J. Li, Enhanced privacy id: A direct anonymous attestation scheme with enhanced revocation capabilities, Dependable and Secure Computing IEEE Transactions on, (2007), 21-30. doi: 10.1145/1314333.1314337.

[3]

M. Backes, M. Maffei and D. Unruh, Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol, Security and Privacy, 2008. SP 2008. IEEE Symposium on IEEE, 7 (2008), 202-215. doi: 10.1109/SP.2008.23.

[4]

V. Cambazoglu and C. Rohne, Towards adaptive zero-knowledge protocols: A case study with fiat-shamir identification protocol, Computer Science, 6 (2013), 511-520.

[5]

S. Grzonkowski and P. Corcoran, A practical zero-knowledge proof protocol for web applications, Journal of Information Assurance and Security, 9 (2014), p329.

[6]

H. Khiabani, N. B. Idris and J. A. Manan, Unified trust establishment by leveraging remote attestation - modeling and analysis, Information Management and Computer Security, 21 (2013), 360-380. doi: 10.1108/IMCS-11-2012-0062.

[7]

M. H. Kim, S. Lee and K. C. Lee, Performance evaluation of node-mapping-based flexray-can gateway for in-vehicle networking system, Intelligent Automation and Soft Computing, 21 (2015), 251-263. doi: 10.1080/10798587.2014.981999.

[8]

N. Kaaniche, E. E. Moustaine and M. Laurent, A Novel Zero-Knowledge Scheme for Proof of Data Possession in Cloud Storage Applications, Cluster, Cloud and Grid Computing (CCGrid), 2014 14th IEEE/ACM International Symposium on IEEE, 2 (2014), 522-531. doi: 10.1109/CCGrid.2014.81.

[9]

K. Lee, H. L. Dong and M. Yung, Sequential aggregate signatures with short public keys: Design, analysis and implementation studies, Lecture Notes in Computer Science, 7778 (2013), 423-442. doi: 10.1007/978-3-642-36362-7_26.

[10]

A. Malaver, N. Motta, P. Corke and F. Gonzalez, Development and integration of a solar powered unmanned aerial vehicle and a wireless sensor network to monitor greenhouse gases, Sensors, 15 (2015), 4072-4096. doi: 10.3390/s150204072.

[11]

F. A. Mohamed and E. E. M. Hemayed, Using trusted computing in trusted mail transfer protocol, Security and Communication Networks, 7 (2014), 926-933. doi: 10.1002/sec.804.

[12]

S. Patel, V. Patel and D. Jinwala, Privacy preserving distributed k-means clustering in malicious model using zero knowledge proof, Lecture Notes in Computer Science, 7753 (2013), 420-431. doi: 10.1007/978-3-642-36071-8_33.

[13]

J. Suwatthikul, R. Mcmurran and R. P. Jones, Adaptive OSEK Network Management for in-vehicle network fault detection, 2007. ICVES. IEEE International Conference on Vehicular Electronics and Safety, 8 (2007), 1-6. doi: 10.1109/ICVES.2007.4456405.

[14]

S. Woo, H. J. Jo and D. H. Lee, A practical wireless attack on the connected car and security protocol for in-vehicle can, Intelligent Transportation Systems IEEE Transactions on, 16 (2015), 993-1006. doi: 10.1109/TITS.2014.2351612.

[15]

Z. Yan, W. Sun, Z. Chen and S. Zhao, A parallel geographical network vehicle routing algorithm on pc clusters, Acta Geodaetica Et Cartographica Sinica, 43 (2014), 753-760.

[16]

M. Ziefle, P. Pappachan, E. M. Jakobs and H. Wallentowitz, Visual and auditory interfaces of advanced driver assistant systems for older drivers, Lecture Notes in Computer Science, 5105 (2008), 62-69. doi: 10.1007/978-3-540-70540-6_8.

show all references

References:
[1]

S. Astapov and A. Riid, A multistage procedure of mobile vehicle acoustic identification for single-sensor embedded device, International Journal of Electronics and Telecommunications, 59 (2013), 151-160. doi: 10.2478/eletel-2013-0018.

[2]

E. Brickell and J. Li, Enhanced privacy id: A direct anonymous attestation scheme with enhanced revocation capabilities, Dependable and Secure Computing IEEE Transactions on, (2007), 21-30. doi: 10.1145/1314333.1314337.

[3]

M. Backes, M. Maffei and D. Unruh, Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol, Security and Privacy, 2008. SP 2008. IEEE Symposium on IEEE, 7 (2008), 202-215. doi: 10.1109/SP.2008.23.

[4]

V. Cambazoglu and C. Rohne, Towards adaptive zero-knowledge protocols: A case study with fiat-shamir identification protocol, Computer Science, 6 (2013), 511-520.

[5]

S. Grzonkowski and P. Corcoran, A practical zero-knowledge proof protocol for web applications, Journal of Information Assurance and Security, 9 (2014), p329.

[6]

H. Khiabani, N. B. Idris and J. A. Manan, Unified trust establishment by leveraging remote attestation - modeling and analysis, Information Management and Computer Security, 21 (2013), 360-380. doi: 10.1108/IMCS-11-2012-0062.

[7]

M. H. Kim, S. Lee and K. C. Lee, Performance evaluation of node-mapping-based flexray-can gateway for in-vehicle networking system, Intelligent Automation and Soft Computing, 21 (2015), 251-263. doi: 10.1080/10798587.2014.981999.

[8]

N. Kaaniche, E. E. Moustaine and M. Laurent, A Novel Zero-Knowledge Scheme for Proof of Data Possession in Cloud Storage Applications, Cluster, Cloud and Grid Computing (CCGrid), 2014 14th IEEE/ACM International Symposium on IEEE, 2 (2014), 522-531. doi: 10.1109/CCGrid.2014.81.

[9]

K. Lee, H. L. Dong and M. Yung, Sequential aggregate signatures with short public keys: Design, analysis and implementation studies, Lecture Notes in Computer Science, 7778 (2013), 423-442. doi: 10.1007/978-3-642-36362-7_26.

[10]

A. Malaver, N. Motta, P. Corke and F. Gonzalez, Development and integration of a solar powered unmanned aerial vehicle and a wireless sensor network to monitor greenhouse gases, Sensors, 15 (2015), 4072-4096. doi: 10.3390/s150204072.

[11]

F. A. Mohamed and E. E. M. Hemayed, Using trusted computing in trusted mail transfer protocol, Security and Communication Networks, 7 (2014), 926-933. doi: 10.1002/sec.804.

[12]

S. Patel, V. Patel and D. Jinwala, Privacy preserving distributed k-means clustering in malicious model using zero knowledge proof, Lecture Notes in Computer Science, 7753 (2013), 420-431. doi: 10.1007/978-3-642-36071-8_33.

[13]

J. Suwatthikul, R. Mcmurran and R. P. Jones, Adaptive OSEK Network Management for in-vehicle network fault detection, 2007. ICVES. IEEE International Conference on Vehicular Electronics and Safety, 8 (2007), 1-6. doi: 10.1109/ICVES.2007.4456405.

[14]

S. Woo, H. J. Jo and D. H. Lee, A practical wireless attack on the connected car and security protocol for in-vehicle can, Intelligent Transportation Systems IEEE Transactions on, 16 (2015), 993-1006. doi: 10.1109/TITS.2014.2351612.

[15]

Z. Yan, W. Sun, Z. Chen and S. Zhao, A parallel geographical network vehicle routing algorithm on pc clusters, Acta Geodaetica Et Cartographica Sinica, 43 (2014), 753-760.

[16]

M. Ziefle, P. Pappachan, E. M. Jakobs and H. Wallentowitz, Visual and auditory interfaces of advanced driver assistant systems for older drivers, Lecture Notes in Computer Science, 5105 (2008), 62-69. doi: 10.1007/978-3-540-70540-6_8.

[1]

Subrata Dasgupta. Disentangling data, information and knowledge. Big Data & Information Analytics, 2016, 1 (4) : 377-389. doi: 10.3934/bdia.2016016

[2]

Roberto Civino, Riccardo Longo. Formal security proof for a scheme on a topological network. Advances in Mathematics of Communications, 2021  doi: 10.3934/amc.2021009

[3]

Alessandro Ferriero. A direct proof of the Tonelli's partial regularity result. Discrete and Continuous Dynamical Systems, 2012, 32 (6) : 2089-2099. doi: 10.3934/dcds.2012.32.2089

[4]

Jose-Luis Roca-Gonzalez. Designing dynamical systems for security and defence network knowledge management. A case of study: Airport bird control falconers organizations. Discrete and Continuous Dynamical Systems - S, 2015, 8 (6) : 1311-1329. doi: 10.3934/dcdss.2015.8.1311

[5]

Pierre-Emmanuel Mazaré, Olli-Pekka Tossavainen, Daniel B. Work. Computing travel times from filtered traffic states. Discrete and Continuous Dynamical Systems - S, 2014, 7 (3) : 557-578. doi: 10.3934/dcdss.2014.7.557

[6]

Lars Grüne. Computing Lyapunov functions using deep neural networks. Journal of Computational Dynamics, 2021, 8 (2) : 131-152. doi: 10.3934/jcd.2021006

[7]

Yang Lu, Jiguo Li. Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model. Advances in Mathematics of Communications, 2017, 11 (1) : 161-177. doi: 10.3934/amc.2017010

[8]

Mahendra Piraveenan, Mikhail Prokopenko, Albert Y. Zomaya. On congruity of nodes and assortative information content in complex networks. Networks and Heterogeneous Media, 2012, 7 (3) : 441-461. doi: 10.3934/nhm.2012.7.441

[9]

Mary Luz Mouronte, Rosa María Benito. Structural analysis and traffic flow in the transport networks of Madrid. Networks and Heterogeneous Media, 2015, 10 (1) : 127-148. doi: 10.3934/nhm.2015.10.127

[10]

Gabriella Bretti, Roberto Natalini, Benedetto Piccoli. Numerical approximations of a traffic flow model on networks. Networks and Heterogeneous Media, 2006, 1 (1) : 57-84. doi: 10.3934/nhm.2006.1.57

[11]

Gabriella Bretti, Roberto Natalini, Benedetto Piccoli. Fast algorithms for the approximation of a traffic flow model on networks. Discrete and Continuous Dynamical Systems - B, 2006, 6 (3) : 427-448. doi: 10.3934/dcdsb.2006.6.427

[12]

Paola Goatin. Traffic flow models with phase transitions on road networks. Networks and Heterogeneous Media, 2009, 4 (2) : 287-301. doi: 10.3934/nhm.2009.4.287

[13]

Alberto Bressan, Ke Han. Existence of optima and equilibria for traffic flow on networks. Networks and Heterogeneous Media, 2013, 8 (3) : 627-648. doi: 10.3934/nhm.2013.8.627

[14]

Alessia Marigo. Optimal traffic distribution and priority coefficients for telecommunication networks. Networks and Heterogeneous Media, 2006, 1 (2) : 315-336. doi: 10.3934/nhm.2006.1.315

[15]

Ye Sun, Daniel B. Work. Error bounds for Kalman filters on traffic networks. Networks and Heterogeneous Media, 2018, 13 (2) : 261-295. doi: 10.3934/nhm.2018012

[16]

Abraham Sylla. Influence of a slow moving vehicle on traffic: Well-posedness and approximation for a mildly nonlocal model. Networks and Heterogeneous Media, 2021, 16 (2) : 221-256. doi: 10.3934/nhm.2021005

[17]

Serap Ergün, Bariş Bülent Kırlar, Sırma Zeynep Alparslan Gök, Gerhard-Wilhelm Weber. An application of crypto cloud computing in social networks by cooperative game theory. Journal of Industrial and Management Optimization, 2020, 16 (4) : 1927-1941. doi: 10.3934/jimo.2019036

[18]

Stamatios Katsikas, Vassilli Kolokoltsov. Evolutionary, mean-field and pressure-resistance game modelling of networks security. Journal of Dynamics and Games, 2019, 6 (4) : 315-335. doi: 10.3934/jdg.2019021

[19]

Melody Alsaker, Sarah Jane Hamilton, Andreas Hauptmann. A direct D-bar method for partial boundary data electrical impedance tomography with a priori information. Inverse Problems and Imaging, 2017, 11 (3) : 427-454. doi: 10.3934/ipi.2017020

[20]

Xuena Yan, Shunfu Jin, Wuyi Yue, Yutaka Takahashi. Performance analysis and system optimization of an energy-saving mechanism in cloud computing with correlated traffic. Journal of Industrial and Management Optimization, 2021  doi: 10.3934/jimo.2021106

2021 Impact Factor: 1.865

Metrics

  • PDF downloads (176)
  • HTML views (0)
  • Cited by (0)

Other articles
by authors

[Back to Top]