• Previous Article
    Designing dynamical systems for security and defence network knowledge management. A case of study: Airport bird control falconers organizations
  • DCDS-S Home
  • This Issue
  • Next Article
    Characteristic analysis of carrier based on the filtering and a multi-wavelet method for the information hiding
December  2015, 8(6): 1301-1309. doi: 10.3934/dcdss.2015.8.1301

The application of improved-DAA for the vehicle network node security in single- and multi-trusted domain

1. 

School of Information Engineering, Chang'an University, Xi'an, Shaanxi 710064, China

2. 

School of Electronic and Control Engineering, Chang'an University, Xi'an, Shaanxi 710064

3. 

School of Information Engineering, Xizang Minzu University, Xianyang, Shaanxi 712082

Received  May 2015 Revised  September 2015 Published  December 2015

Similar to network, vehicle-mounted system has its own vulnerability, which can be used by the attackers. Different from the traditional network security technologies, node security is one of the most important technologies of the vehicle network and it is difficult to achieve because of the mobility and flexibility. In this paper, trusted computing and direct anonymous attestation theories are adopted to establish protocol system of trusted vehicle information authentication, thus the security of authentication process for nodes in vehicle network can be improved. First, we use DAA to achieve the identity authentication for the accessor in single-trusted domain. Second, the improved-DAA will be used to try to promote the security situation in multi-trusted domain. It is illustrated that the efficiency of verification can be increased and the possibility of being attacked can be decreased in single-trusted domain. And the execution efficiency in multi-trusted domain can be improved theoretically.
Citation: Shuai Ren, Tao Zhang, Fangxia Shi, Zongzong Lou. The application of improved-DAA for the vehicle network node security in single- and multi-trusted domain. Discrete & Continuous Dynamical Systems - S, 2015, 8 (6) : 1301-1309. doi: 10.3934/dcdss.2015.8.1301
References:
[1]

S. Astapov and A. Riid, A multistage procedure of mobile vehicle acoustic identification for single-sensor embedded device,, International Journal of Electronics and Telecommunications, 59 (2013), 151.  doi: 10.2478/eletel-2013-0018.  Google Scholar

[2]

E. Brickell and J. Li, Enhanced privacy id: A direct anonymous attestation scheme with enhanced revocation capabilities,, Dependable and Secure Computing IEEE Transactions on, (2007), 21.  doi: 10.1145/1314333.1314337.  Google Scholar

[3]

M. Backes, M. Maffei and D. Unruh, Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol,, Security and Privacy, 7 (2008), 202.  doi: 10.1109/SP.2008.23.  Google Scholar

[4]

V. Cambazoglu and C. Rohne, Towards adaptive zero-knowledge protocols: A case study with fiat-shamir identification protocol,, Computer Science, 6 (2013), 511.   Google Scholar

[5]

S. Grzonkowski and P. Corcoran, A practical zero-knowledge proof protocol for web applications,, Journal of Information Assurance and Security, 9 (2014).   Google Scholar

[6]

H. Khiabani, N. B. Idris and J. A. Manan, Unified trust establishment by leveraging remote attestation - modeling and analysis,, Information Management and Computer Security, 21 (2013), 360.  doi: 10.1108/IMCS-11-2012-0062.  Google Scholar

[7]

M. H. Kim, S. Lee and K. C. Lee, Performance evaluation of node-mapping-based flexray-can gateway for in-vehicle networking system,, Intelligent Automation and Soft Computing, 21 (2015), 251.  doi: 10.1080/10798587.2014.981999.  Google Scholar

[8]

N. Kaaniche, E. E. Moustaine and M. Laurent, A Novel Zero-Knowledge Scheme for Proof of Data Possession in Cloud Storage Applications,, Cluster, 2 (2014), 522.  doi: 10.1109/CCGrid.2014.81.  Google Scholar

[9]

K. Lee, H. L. Dong and M. Yung, Sequential aggregate signatures with short public keys: Design, analysis and implementation studies,, Lecture Notes in Computer Science, 7778 (2013), 423.  doi: 10.1007/978-3-642-36362-7_26.  Google Scholar

[10]

A. Malaver, N. Motta, P. Corke and F. Gonzalez, Development and integration of a solar powered unmanned aerial vehicle and a wireless sensor network to monitor greenhouse gases,, Sensors, 15 (2015), 4072.  doi: 10.3390/s150204072.  Google Scholar

[11]

F. A. Mohamed and E. E. M. Hemayed, Using trusted computing in trusted mail transfer protocol,, Security and Communication Networks, 7 (2014), 926.  doi: 10.1002/sec.804.  Google Scholar

[12]

S. Patel, V. Patel and D. Jinwala, Privacy preserving distributed k-means clustering in malicious model using zero knowledge proof,, Lecture Notes in Computer Science, 7753 (2013), 420.  doi: 10.1007/978-3-642-36071-8_33.  Google Scholar

[13]

J. Suwatthikul, R. Mcmurran and R. P. Jones, Adaptive OSEK Network Management for in-vehicle network fault detection,, 2007. ICVES. IEEE International Conference on Vehicular Electronics and Safety, 8 (2007), 1.  doi: 10.1109/ICVES.2007.4456405.  Google Scholar

[14]

S. Woo, H. J. Jo and D. H. Lee, A practical wireless attack on the connected car and security protocol for in-vehicle can,, Intelligent Transportation Systems IEEE Transactions on, 16 (2015), 993.  doi: 10.1109/TITS.2014.2351612.  Google Scholar

[15]

Z. Yan, W. Sun, Z. Chen and S. Zhao, A parallel geographical network vehicle routing algorithm on pc clusters,, Acta Geodaetica Et Cartographica Sinica, 43 (2014), 753.   Google Scholar

[16]

M. Ziefle, P. Pappachan, E. M. Jakobs and H. Wallentowitz, Visual and auditory interfaces of advanced driver assistant systems for older drivers,, Lecture Notes in Computer Science, 5105 (2008), 62.  doi: 10.1007/978-3-540-70540-6_8.  Google Scholar

show all references

References:
[1]

S. Astapov and A. Riid, A multistage procedure of mobile vehicle acoustic identification for single-sensor embedded device,, International Journal of Electronics and Telecommunications, 59 (2013), 151.  doi: 10.2478/eletel-2013-0018.  Google Scholar

[2]

E. Brickell and J. Li, Enhanced privacy id: A direct anonymous attestation scheme with enhanced revocation capabilities,, Dependable and Secure Computing IEEE Transactions on, (2007), 21.  doi: 10.1145/1314333.1314337.  Google Scholar

[3]

M. Backes, M. Maffei and D. Unruh, Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol,, Security and Privacy, 7 (2008), 202.  doi: 10.1109/SP.2008.23.  Google Scholar

[4]

V. Cambazoglu and C. Rohne, Towards adaptive zero-knowledge protocols: A case study with fiat-shamir identification protocol,, Computer Science, 6 (2013), 511.   Google Scholar

[5]

S. Grzonkowski and P. Corcoran, A practical zero-knowledge proof protocol for web applications,, Journal of Information Assurance and Security, 9 (2014).   Google Scholar

[6]

H. Khiabani, N. B. Idris and J. A. Manan, Unified trust establishment by leveraging remote attestation - modeling and analysis,, Information Management and Computer Security, 21 (2013), 360.  doi: 10.1108/IMCS-11-2012-0062.  Google Scholar

[7]

M. H. Kim, S. Lee and K. C. Lee, Performance evaluation of node-mapping-based flexray-can gateway for in-vehicle networking system,, Intelligent Automation and Soft Computing, 21 (2015), 251.  doi: 10.1080/10798587.2014.981999.  Google Scholar

[8]

N. Kaaniche, E. E. Moustaine and M. Laurent, A Novel Zero-Knowledge Scheme for Proof of Data Possession in Cloud Storage Applications,, Cluster, 2 (2014), 522.  doi: 10.1109/CCGrid.2014.81.  Google Scholar

[9]

K. Lee, H. L. Dong and M. Yung, Sequential aggregate signatures with short public keys: Design, analysis and implementation studies,, Lecture Notes in Computer Science, 7778 (2013), 423.  doi: 10.1007/978-3-642-36362-7_26.  Google Scholar

[10]

A. Malaver, N. Motta, P. Corke and F. Gonzalez, Development and integration of a solar powered unmanned aerial vehicle and a wireless sensor network to monitor greenhouse gases,, Sensors, 15 (2015), 4072.  doi: 10.3390/s150204072.  Google Scholar

[11]

F. A. Mohamed and E. E. M. Hemayed, Using trusted computing in trusted mail transfer protocol,, Security and Communication Networks, 7 (2014), 926.  doi: 10.1002/sec.804.  Google Scholar

[12]

S. Patel, V. Patel and D. Jinwala, Privacy preserving distributed k-means clustering in malicious model using zero knowledge proof,, Lecture Notes in Computer Science, 7753 (2013), 420.  doi: 10.1007/978-3-642-36071-8_33.  Google Scholar

[13]

J. Suwatthikul, R. Mcmurran and R. P. Jones, Adaptive OSEK Network Management for in-vehicle network fault detection,, 2007. ICVES. IEEE International Conference on Vehicular Electronics and Safety, 8 (2007), 1.  doi: 10.1109/ICVES.2007.4456405.  Google Scholar

[14]

S. Woo, H. J. Jo and D. H. Lee, A practical wireless attack on the connected car and security protocol for in-vehicle can,, Intelligent Transportation Systems IEEE Transactions on, 16 (2015), 993.  doi: 10.1109/TITS.2014.2351612.  Google Scholar

[15]

Z. Yan, W. Sun, Z. Chen and S. Zhao, A parallel geographical network vehicle routing algorithm on pc clusters,, Acta Geodaetica Et Cartographica Sinica, 43 (2014), 753.   Google Scholar

[16]

M. Ziefle, P. Pappachan, E. M. Jakobs and H. Wallentowitz, Visual and auditory interfaces of advanced driver assistant systems for older drivers,, Lecture Notes in Computer Science, 5105 (2008), 62.  doi: 10.1007/978-3-540-70540-6_8.  Google Scholar

[1]

Subrata Dasgupta. Disentangling data, information and knowledge. Big Data & Information Analytics, 2016, 1 (4) : 377-389. doi: 10.3934/bdia.2016016

[2]

Alessandro Ferriero. A direct proof of the Tonelli's partial regularity result. Discrete & Continuous Dynamical Systems - A, 2012, 32 (6) : 2089-2099. doi: 10.3934/dcds.2012.32.2089

[3]

Jose-Luis Roca-Gonzalez. Designing dynamical systems for security and defence network knowledge management. A case of study: Airport bird control falconers organizations. Discrete & Continuous Dynamical Systems - S, 2015, 8 (6) : 1311-1329. doi: 10.3934/dcdss.2015.8.1311

[4]

Pierre-Emmanuel Mazaré, Olli-Pekka Tossavainen, Daniel B. Work. Computing travel times from filtered traffic states. Discrete & Continuous Dynamical Systems - S, 2014, 7 (3) : 557-578. doi: 10.3934/dcdss.2014.7.557

[5]

Yang Lu, Jiguo Li. Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model. Advances in Mathematics of Communications, 2017, 11 (1) : 161-177. doi: 10.3934/amc.2017010

[6]

Mahendra Piraveenan, Mikhail Prokopenko, Albert Y. Zomaya. On congruity of nodes and assortative information content in complex networks. Networks & Heterogeneous Media, 2012, 7 (3) : 441-461. doi: 10.3934/nhm.2012.7.441

[7]

Mary Luz Mouronte, Rosa María Benito. Structural analysis and traffic flow in the transport networks of Madrid. Networks & Heterogeneous Media, 2015, 10 (1) : 127-148. doi: 10.3934/nhm.2015.10.127

[8]

Gabriella Bretti, Roberto Natalini, Benedetto Piccoli. Numerical approximations of a traffic flow model on networks. Networks & Heterogeneous Media, 2006, 1 (1) : 57-84. doi: 10.3934/nhm.2006.1.57

[9]

Gabriella Bretti, Roberto Natalini, Benedetto Piccoli. Fast algorithms for the approximation of a traffic flow model on networks. Discrete & Continuous Dynamical Systems - B, 2006, 6 (3) : 427-448. doi: 10.3934/dcdsb.2006.6.427

[10]

Paola Goatin. Traffic flow models with phase transitions on road networks. Networks & Heterogeneous Media, 2009, 4 (2) : 287-301. doi: 10.3934/nhm.2009.4.287

[11]

Alberto Bressan, Ke Han. Existence of optima and equilibria for traffic flow on networks. Networks & Heterogeneous Media, 2013, 8 (3) : 627-648. doi: 10.3934/nhm.2013.8.627

[12]

Alessia Marigo. Optimal traffic distribution and priority coefficients for telecommunication networks. Networks & Heterogeneous Media, 2006, 1 (2) : 315-336. doi: 10.3934/nhm.2006.1.315

[13]

Ye Sun, Daniel B. Work. Error bounds for Kalman filters on traffic networks. Networks & Heterogeneous Media, 2018, 13 (2) : 261-295. doi: 10.3934/nhm.2018012

[14]

Melody Alsaker, Sarah Jane Hamilton, Andreas Hauptmann. A direct D-bar method for partial boundary data electrical impedance tomography with a priori information. Inverse Problems & Imaging, 2017, 11 (3) : 427-454. doi: 10.3934/ipi.2017020

[15]

Serap Ergün, Bariş Bülent Kırlar, Sırma Zeynep Alparslan Gök, Gerhard-Wilhelm Weber. An application of crypto cloud computing in social networks by cooperative game theory. Journal of Industrial & Management Optimization, 2017, 13 (5) : 1-15. doi: 10.3934/jimo.2019036

[16]

Stamatios Katsikas, Vassilli Kolokoltsov. Evolutionary, mean-field and pressure-resistance game modelling of networks security. Journal of Dynamics & Games, 2019, 6 (4) : 315-335. doi: 10.3934/jdg.2019021

[17]

Karim El Laithy, Martin Bogdan. Synaptic energy drives the information processing mechanisms in spiking neural networks. Mathematical Biosciences & Engineering, 2014, 11 (2) : 233-256. doi: 10.3934/mbe.2014.11.233

[18]

Heman Shakeri, Faryad Darabi Sahneh, Caterina Scoglio, Pietro Poggi-Corradini, Victor M. Preciado. Optimal information dissemination strategy to promote preventive behaviors in multilayer epidemic networks. Mathematical Biosciences & Engineering, 2015, 12 (3) : 609-623. doi: 10.3934/mbe.2015.12.609

[19]

Shui-Nee Chow, Xiaojing Ye, Hongyuan Zha, Haomin Zhou. Influence prediction for continuous-time information propagation on networks. Networks & Heterogeneous Media, 2018, 13 (4) : 567-583. doi: 10.3934/nhm.2018026

[20]

Jingli Ren, Dandan Zhu, Haiyan Wang. Spreading-vanishing dichotomy in information diffusion in online social networks with intervention. Discrete & Continuous Dynamical Systems - B, 2019, 24 (4) : 1843-1865. doi: 10.3934/dcdsb.2018240

2018 Impact Factor: 0.545

Metrics

  • PDF downloads (10)
  • HTML views (0)
  • Cited by (0)

Other articles
by authors

[Back to Top]