A Provable Secure Session Key Distribution Protocol Based on NSSK for In-Vehicle CAN Network
نویسندگان
چکیده
Many CAN-based session key sharing approaches are based on the group scheme, which can easily lead advanced adversaries to infiltrate all ECUs (electronic control units) in network if is leaked. To address above problem, we propose a provable secure distribution protocol improved NSSK (Needham–Schroeder shared key) for in-vehicle CAN network. We applied mechanisms of message authentication and digital signature fix defects original regarding its lack resistance Denning–Sacco attack. Then, analyzed security proposed random oracle model verified goals by using simulation tools AVISPA Tamarin Prover; results reflect that met requirements such as secrecy, injective agreement, known secrecy. Finally, compared our new with other protocols bus communication evaluate performance actual scenarios. The result shows against many payload-based attacks practical networks.
منابع مشابه
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملProvable Secure Encrypted Key Exchange Protocol Under Standard Model
Encrypted key exchange protocol’s goal is to establish a high secure key used for further encryption and authentication through a low secure password. Most existing encrypted key exchange protocols either lack security proofs or rely on the Random Oracle model. Compared with those protocols based on the Random Oracle model, provable secure EKE (encrypted key exchange) protocols have heavier com...
متن کاملImplementation of a Provably Secure, Smartcard-Based Key Distribution Protocol
We describe the implementation of the Shoup-Rubin key distribution protocol. This protocol stores long-term keys on a smartcard and uses the cryptographic capability of the card to generate and distribute session keys securely. The designers of the protocol provide a mathematical proof of its security, using techniques pioneered by Bellare and Rogaway. Combining this theoretical strength with o...
متن کاملProvable password-based tripartite key agreement protocol
A password-based tripartite key agreement protocol is presented in this paper. The three entities involved in this protocol can negotiate a common session key via a shared password over insecure networks. Proofs are given to show that the proposed protocol is secure against forging and chosen message attacks in the case of without actually running a dictionary attack.
متن کاملSecure Key Distribution Protocol with Smart Meter
Authentication is crucial for large and distributed systems, such as cyber-physical infrastructures. The focus of this paper is on the secure key distribution must be secure enough to any attempts to compromise the system. we first overview the key management scheme how probabilistic argumentation is applicable to modern public-key cryptography as an relevant gadget to evaluate webs of trust. W...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematics
سال: 2022
ISSN: ['2227-7390']
DOI: https://doi.org/10.3390/math10162903