Zhang, Wei, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Zhang, Liping, Ma, Zhao and Song, Jun (2015) Chaotic stream cipher-based secure data communications over intelligent transportation network. International Journal of Antennas and Propagation, 2015. p. 315721. ISSN 1687-5869
Preview |
PDF
Chaotic stream cipher-based secure data communications over intelligent transportation network.pdf - Accepted Version Download (259kB) | Preview |
Preview |
PDF
Zhang-etal-2015-Chaotic-stream-cipher-based-secure-data-communications.pdf - Published Version Available under License Creative Commons Attribution. Download (2MB) | Preview |
Abstract
Intelligent Transportation Systems (ITS) are advanced applications in which the transportation industry is adapted to the information technology revolution. As an important development direction of ITS, the Electronic Toll Collection (ETC) subsystem, which enables an efficient and speedy toll collection, has gained widespread popularity in the world. In an ETC system, toll transaction data are transmitted over intelligent transportation networks, which is vulnerable to eavesdropping, interfering, and tampering attacks. To address the above security problems, we proposed a chaotic stream cipher-based cryptographic scheme to realise secure data communications over Wireless Sensor Network (WSN), which is a part of ITS. The proposed cryptographic scheme allowed ITS to achieve key negotiation and data encryption between sensor nodes in the WSN, whileas reduced computational costs and power consumption. Security analysis and experimental results showed that the proposed scheme could protect data transmission between wireless sensor nodes from being attacked, and significantly reduced the communication overhead for the whole system compared to the existing ECC_AES scheme, thus satisfying the real-time data transmission requirement of ITS.
Item Type: | Article |
---|---|
Identifier: | 10.1155/2015/315721 |
Additional Information: | © 2015 Wei Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
Subjects: | Computing > Information security > Cyber security Computing > Information security |
Depositing User: | Shanyu Tang |
Date Deposited: | 27 Sep 2017 11:49 |
Last Modified: | 04 Nov 2024 12:05 |
URI: | https://repository.uwl.ac.uk/id/eprint/3946 |
Downloads
Downloads per month over past year
Actions (login required)
View Item |