About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Communications and Networking. 15th EAI International Conference, ChinaCom 2020, Shanghai, China, November 20-21, 2020, Proceedings

Research Article

Context-Bound Cybersecurity Framework for Resisting Eavesdropping in Vehicle Networks

Download(Requires a free EAI acccount)
4 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-67720-6_36,
        author={Longjiang Li and Bingchuan Ma and Yonggang Li and Yuming Mao},
        title={Context-Bound Cybersecurity Framework for Resisting Eavesdropping in Vehicle Networks},
        proceedings={Communications and Networking. 15th EAI International Conference, ChinaCom 2020, Shanghai, China, November 20-21, 2020,  Proceedings},
        proceedings_a={CHINACOM},
        year={2021},
        month={2},
        keywords={Cybersecurity Context Vehicle networks Cryptography},
        doi={10.1007/978-3-030-67720-6_36}
    }
    
  • Longjiang Li
    Bingchuan Ma
    Yonggang Li
    Yuming Mao
    Year: 2021
    Context-Bound Cybersecurity Framework for Resisting Eavesdropping in Vehicle Networks
    CHINACOM
    Springer
    DOI: 10.1007/978-3-030-67720-6_36
Longjiang Li1,*, Bingchuan Ma1, Yonggang Li2, Yuming Mao1
  • 1: Department of Network Engineering, SICE, University of Electronic Science and Technology of China
  • 2: Chongqing University of Posts and Telecommunications
*Contact email: longjiangli@uestc.edu.cn

Abstract

Wireless channels that are widely adopted between autonomous vehicles are vulnerable to eavesdropping or interferences, so that attacks on cybersecurity may lead to serious consequences, such as losing control of vehicles. In particular, the cryptographic methods used for information security rely on the strict privacy of keys, which is often difficult to guarantee in a wireless environment. This paper proposes a context-bound cybersecurity framework, which protects communication from eavesdroppers by encrypting critical data with a dynamic context among vehicles. The context is synchronized among vehicles through a progressive encoding method, which makes it difficult for third parties to learn the entire context by eavesdropping through the channels, especially in the case of mobility. The normal vehicles may extract a security key from the context to encrypt and decrypt key data, but it is impossible or overwhelmingly expensive for the third parties to decode the data transmitted due to the lack of the context. Besides, the proposed framework also provides a promising way to resist the upcoming quantum computers, because it will become more and more difficult for third parties to collect the complete context as the context continues to update.

Keywords
Cybersecurity Context Vehicle networks Cryptography
Published
2021-02-02
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-67720-6_36
Copyright © 2020–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL