Challenges and research opportunities in the adoption of post-quantum cryptography in vehicular networks
Abstract
Vehicular networks enable various important applications, such as autonomous driving and traffic accident prevention, which demand a high level of communication security. However, to communicate securely, these networks rely on cryptographic algorithms vulnerable to attacks from future quantum computers, necessitating the adoption of more secure alternatives. Nonetheless, the standardized post-quantum cryptography algorithms have proven incompatible with the stringent latency requirements imposed by such networks, making their adoption challenging. In this work, we identify some of the primary open challenges in the field, based on the analysis of established standards and recent research, and present research opportunities to overcome them.
References
3GPP (2020). Release 16. Technical Specification, 3rd Generation Partnership Project.
Alagic, G. (2022). Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process. Internal Report (IR) IR 8413, NIST.
Barreto, P., Ricardini, J., Simplicio, M., and Patil, H. (2018). qSCMS: Post-quantum certificate provisioning process for V2X. Cryptology ePrint Archive, Paper 2018/1247.
Brecht, B., Therriault, D., Weimerskirch, A., Whyte, W., Kumar, V., Hehn, T., and Goudy, R. (2018). A Security Credential Management System for V2X Communications. IEEE Transactions on Intelligent Transportation Systems, 19(12):3850–3871.
C2C-CC (2018). Survey on ITS-G5 CAM statistics. Technical Report, CAR 2 CAR Communication Consortium.
Cominetti, E. L., Silva, M. V. M., Simplicio, M. A., Kupwade Patil, H., and Ricardini, J. E. (2023). Faster verification of V2X basic safety messages via Message Chaining. Vehicular Communications, 44:100662.
ETSI (2021). Intelligent Transport Systems (ITS); Security, ITS communications security architecture and security management. Technical Specification (TS) TS 102 940, European Telecommunications Standard Institute (ETSI).
IEEE (2016). IEEE Std. for Wireless Access in Vehicular Environments – Security Services for Applications and Management Messages. IEEE Std 1609.2-2016, pages 1–240.
IEEE (2019). IEEE Guide for Wireless Access in Vehicular Environments (WAVE) Architecture. IEEE Std 1609.0-2019, pages 1–106.
IEEE (2022). IEEE Std. for Wireless Access in Vehicular Environments (WAVE) - Certificate Management Interfaces for End Entities. IEEE Std 1609.2.1-2022, pages 1–261.
Jiang, D. and Delgrossi, L. (2008). IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular Environments. In VTC Spring 2008 - IEEE Vehicular Technology Conference, pages 2036–2040.
NIST (2023). Round 1 additional signatures. Post-Quantum Cryptography: Digital Signature Schemes. [link].
Shor, P. (1994). Algorithms for quantum computation: discrete logarithms and factoring. In Proc. 35th Annual Symposium on Foundations of Computer Science, pages 124–134.
Twardokus, G., Bindel, N., Rahbari, H., and McCarthy, S. (2024). When Cryptography Needs a Hand: Practical Post-Quantum Authentication for V2V Communications. Proceedings 2024 Network and Distributed System Security Symposium.
Yoshizawa, T. and Preneel, B. (2019). Survey of Security Aspect of V2X Standards and Related Issues. In 2019 IEEE Conference on Standards for Communications and Networking (CSCN), pages 1–5.
Yoshizawa, T. and Preneel, B. (2023). Post-Quantum Impacts on V2X Certificates – Already at The End of The Road. In 2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring), pages 1–6.
