A comparative performance study of cryptographic algorithms for connected vehicles

Abdessamad Fazzat, Rida Khatoun, Houda Labiod, Renaud Dubois

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

For security applications for connected vehicles, choosing the best cryptographic algorithm is a real challenge. Traditional cryptography does not fit the constraints on the communication (e.g., bandwidth, delay) environment and the protocols defined in the standards do not allow flexibility. In this work, we provide an analysis of the cryptographic algorithms used to secure V2X communications and an overview of lightweight cryptography algorithms in order to select algorithms that might fit the connected vehicles constraints.

Original languageEnglish
Title of host publication2020 4th Cyber Security in Networking Conference, CSNet 2020
EditorsRomain Laborde, Nadjib Aitsaadi, Solange Ghernaouti, Abdelmalek Benzekri, Joaquin Garcia-Alfaro
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781665404587
DOIs
Publication statusPublished - 21 Oct 2020
Externally publishedYes
Event4th Cyber Security in Networking Conference, CSNet 2020 - Virtual, Lausanne, Switzerland
Duration: 21 Oct 202023 Oct 2020

Publication series

Name2020 4th Cyber Security in Networking Conference, CSNet 2020

Conference

Conference4th Cyber Security in Networking Conference, CSNet 2020
Country/TerritorySwitzerland
CityVirtual, Lausanne
Period21/10/2023/10/20

Keywords

  • V2X
  • benchmarking
  • connected vehicles
  • cryptography
  • lighweight cryptography

Fingerprint

Dive into the research topics of 'A comparative performance study of cryptographic algorithms for connected vehicles'. Together they form a unique fingerprint.

Cite this